Interlayer Attacks in Mobile Ad Hoc Networks

  • Lei Guang
  • Chadi Assi
  • Abderrahim Benslimane
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4325)


In this paper, we demonstrate a new class of protocol compliant exploits that initiates at the MAC layer but targets ad hoc on-demand routing mechanisms. A misbehaved node implementing this type of attacks completely follows the specifications of IEEE802.11 standard and the existing on-demand routing protocols. However, it can cause routing shortcut attacks or detour attacks. We detail the exploits against two on-demand routing protocols: AODV and DSR. We evaluate the impact of such attacks on the network performance and propose PSD (Prevention from Shortcut and Detour Attack) to mitigate their impacts.


Ad hoc networks medium access control security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proc. of ACM MobiCom (September 2004)Google Scholar
  2. 2.
    Hu, Y.-C., Perrig, A., Johnson, D.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proc. ACM WiSe (2003)Google Scholar
  3. 3.
    Kyasanur, P., Vaidya, N.: Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing (September 2005)Google Scholar
  4. 4.
    Guang, L., Assi, C.: A self-adaptive detection system for MAC misbehavior in ad hoc networks. In: Proc. of IEEE ICC (June 2006)Google Scholar
  5. 5.
    Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proc. of CNDS (2002)Google Scholar
  6. 6.
    Raya, M., Hubaux, J.P., Aad, I.: DOMINO: A system to detect greedy behavior in ieee 802.11 hotspots. In: Proc. of ACM MobiSys (June 2004)Google Scholar
  7. 7.
    Sadagopan, N., Bai, F., Krishnamachari, B., Helmy, A.: PATHS: analysis of path duration statistics and their impact on reactive manet routing protocols. In: Proc. of ACM MobiHoc (2003)Google Scholar
  8. 8.
    Zapata, M.: Secure Ad Hoc on-demand distance vector (SAODV) routing. Technical report Internet Draft (2001),
  9. 9.
    Hu, Y.-C., Perrig, A., Johnson, D.: Ariadne: A secure on-demand routing protocol for adhoc networks. In: Proc. of MobiCom (September 2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Lei Guang
    • 1
  • Chadi Assi
    • 1
  • Abderrahim Benslimane
    • 2
  1. 1.Concordia Institute for Information System EngineeringConcordia UniversityMontréalCanada
  2. 2.Laboratoire Informatique d’AvignonUniversité d’ AvignonAvignon Cedex 9France

Personalised recommendations