• DocumentCode
    568500
  • Title

    Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs

  • Author

    Ehsan, Humaira ; Khan, Farrukh Aslam

  • Author_Institution
    Dept. of Comput. Sci., Nat. Univ. of Comput. & Emerging Sci., Islamabad, Pakistan
  • fYear
    2012
  • fDate
    25-27 June 2012
  • Firstpage
    1181
  • Lastpage
    1187
  • Abstract
    From the security perspective Mobile Ad hoc Networks (MANETs) are amongst the most challenging research areas and one of the key reasons for this is the ambiguous nature of insider attacks in these networks. In recent years, many attempts have been made to study the intrinsic attributes of these insider attacks but the focus has generally been on the analysis of one or very few particular attacks, or only the survey of various attacks without any performance analysis. Therefore, a major feature that research has lately lacked is a detailed and comprehensive study of the effects of various insider attacks on the overall performance of MANETs. In this paper we investigate, in detail, some of the most severe attacks against MANETs namely the blackhole attack, sinkhole attack, selfish node behavior, RREQ flood, hello flood, and selective forwarding attack. A detailed NS-2 implementation of launching these attacks successfully using Ad hoc On-Demand Distance Vector (AODV) routing protocol has been presented and a comprehensive and comparative analysis of these attacks is performed. We use packet efficiency, routing overhead, and throughput as our performance metrics. Our simulation-based study shows that flooding attacks like RREQ flood and hello flood drastically increase the routing overhead of the protocol. Route modification attacks such as sinkhole and blackhole are deadly and severely affect the packet efficiency and bring down the throughput to unacceptable ranges.
  • Keywords
    mobile ad hoc networks; routing protocols; telecommunication security; AODV routing protocol; MANET; RREQ flood; ad hoc on-demand distance vector routing protocol; blackhole; blackhole attack; hello flood; malicious AODV; mobile ad hoc networks security; performance metrics; route modification attacks; routing attacks; selective forwarding attack; selfish node behavior; sinkhole; sinkhole attack; Ad hoc networks; Data models; Mobile computing; Routing; Routing protocols; Throughput; Blackhole; Hello flood; MANETs; Network layer attacks; RREQ flood; Selective forwarding; Selfish Node; Sinkhole;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
  • Conference_Location
    Liverpool
  • Print_ISBN
    978-1-4673-2172-3
  • Type

    conf

  • DOI
    10.1109/TrustCom.2012.199
  • Filename
    6296111