• Title of article

    How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols

  • Author/Authors

    Peng Ning، نويسنده , , Kun Sun Peng Ning، نويسنده ,

  • Issue Information
    دوماهنامه با شماره پیاپی سال 2005
  • Pages
    25
  • From page
    795
  • To page
    819
  • Abstract
    This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals, and then studies how to achieve these goals through misuses of the routing messages. To facilitate the analysis, it classifies insider attacks into two categories: atomic misuses and compound misuses. Atomic misuses are performed by manipulating a single routing message, which cannot be further divided; compound misuses are composed of combinations of atomic misuses and possibly normal uses of the routing protocol. The analysis results in this paper reveal several classes of insider attacks, including route disruption, route invasion, node isolation, and resource consumption. Finally, this paper presents simulation results that validate and demonstrate the impact of these attacks.
  • Keywords
    Routing protocol , Insider attacks , Mobile ad-hoc networks , AODV
  • Journal title
    Ad Hoc Networks
  • Serial Year
    2005
  • Journal title
    Ad Hoc Networks
  • Record number

    968225