Title :
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
Author :
Ning, Peng ; Sun, Kun
Author_Institution :
Comput. Sci. Dept., North Carolina State Univ., Raleigh, NC, USA
Abstract :
We present a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals and then studies how to achieve these goals through misuses of the routing messages. To facilitate the analysis, we classify the insider attacks into two categories: atomic misuses and compound misuses. Atomic misuses are performed by manipulating a single routing message, which cannot be further divided; compound misuses are composed of combinations of atomic misuses and possibly normal uses of the routing protocol. The analysis results reveal several classes of insider attacks, including route disruption, route invasion, node isolation, and resource consumption. We also describe simulation results that demonstrate the impact of these attacks.
Keywords :
ad hoc networks; mobile radio; routing protocols; telecommunication security; AODV protocol; Ad hoc On-Demand Distance Vector protocol; atomic misuses; compound misuses; insider attack analysis; mobile ad-hoc routing protocol; node isolation; resource consumption; route disruption; route invasion; routing message; Ad hoc networks; Computer aided software engineering; Computer science; Hardware; Mobile ad hoc networks; Mobile computing; National security; Protection; Routing protocols; Sun;
Conference_Titel :
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Print_ISBN :
0-7803-7808-3
DOI :
10.1109/SMCSIA.2003.1232402