DocumentCode :
3352246
Title :
On vulnerability and protection of ad hoc on-demand distance vector protocol
Author :
Wang, Weichao ; Lu, Yi ; Bhargava, Bharat K.
Author_Institution :
Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA
Volume :
1
fYear :
2003
fDate :
23 Feb.-1 March 2003
Firstpage :
375
Abstract :
Vulnerabilities and attacks on the ad hoc on-demand distance vector (AODV) routing protocol are investigated and studied via analysis and simulation. The attacks are classified by their target properties. The analysis shows that the on-demand route query enables the malicious host to conduct real time attacks on AODV. False distance vector and false destination sequence attacks are studied by simulation. Two connection scenarios are considered: common destination and uniformly distributed traffic load. The delivery ratio, attack overhead, and the propagation of false routes are measured by varying the number of connections and the mobility of the hosts. The simulation results illustrate that the attacker can confuse the network connectivity with false routes and lead to a decrease in the delivery ratio of up to 75%. When the hosts are uniformly distributed, the false distance vector attacks cannot cheat more than half of the hosts, but the false destination sequence routes can propagate to most of the network. The anomaly patterns of sequence numbers carried by routing request (RREQ) can be applied to detect the false destination sequence attacks. The vulnerability analysis results and anomaly patterns can be employed by other ad hoc routing protocols to establish intrusion prevention and detection mechanisms.
Keywords :
ad hoc networks; mobile radio; routing protocols; telecommunication security; telecommunication traffic; AODV protocol; ad hoc on-demand distance vector protocol; ad hoc routing protocols; common destination; delivery ratio; false destination sequence attacks; false distance vector attacks; intrusion detection; intrusion prevention; network connectivity; on-demand route query; routing request; uniformly distributed traffic load; vulnerability analysis; Ad hoc networks; Analytical models; Authentication; Computational modeling; Information security; Mobile computing; Network topology; Protection; Routing protocols; Switches;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Telecommunications, 2003. ICT 2003. 10th International Conference on
Print_ISBN :
0-7803-7661-7
Type :
conf
DOI :
10.1109/ICTEL.2003.1191259
Filename :
1191259
Link To Document :
بازگشت