Title :
A new set of passive routing attacks in mobile ad hoc networks
Author :
Kong, Jiejun ; Hong, Xiaoyan ; Gerla, Mario
Author_Institution :
Comput. Sci. Dept., California Univ., Los Angeles, CA, USA
Abstract :
In hostile environments, adversaries can launch passive attacks against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to trace network routes and infer the motion pattern of nodes at the end of those routes may pose a serious threat to covert operations. In this paper we propose a feasible adversary model of such attacks, then present several instantiations and study the principles of designing corresponding countermeasures. We demonstrate that existing ad hoc routing protocols are vulnerable to passive attacks: in the feasible adversary model, (a) the location and motion patterns of mobile nodes can be traced, while (b) proactive and reactive/on-demand ad hoc routes across multiple mobile nodes can be visualized by the adversary. We conclude that ad hoc networks deployed in hostile environments need new countermeasures to resist such passive attacks.
Keywords :
ad hoc networks; mobile radio; packet switching; routing protocols; data packets; feasible adversary model; mobile ad hoc networks; mobile nodes; motion patterns; passive routing attacks; routing messages; routing protocols; Ad hoc networks; Computer science; Intelligent networks; Mobile ad hoc networks; Privacy; Protocols; Routing; Telecommunication traffic; Timing; Visualization;
Conference_Titel :
Military Communications Conference, 2003. MILCOM '03. 2003 IEEE
Print_ISBN :
0-7803-8140-8
DOI :
10.1109/MILCOM.2003.1290214