Advertisement

Modelling and Analysis of Attacks on the MANET Routing in AODV

  • Peter Ebinger
  • Tobias Bucher
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4104)

Abstract

Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. In this article primary attack methods (black hole, wormhole, rushing, and Sybil) to MANET routing using the Ad-hoc On-demand Distance Vector (AODV) protocol are modelled and analyzed in a consistent way. This process comprises a semi-formal analysis of pre-conditions (costs, probability of success, required skills) and resulting damage from each attack by means of attack trees. We thereby get a uniform way of modelling and analyzing various attacks to MANET routing that allows to directly compare the different attacks and to assess the risks.

Keywords

Black Hole Route Request Successful Attack Attack Tree Route Reply 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of Service Resilience in Ad Hoc Networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, Philadelphia, PA, USA, pp. 202–215. ACM Press, New York (2004)CrossRefGoogle Scholar
  2. 2.
    Al-Shurman, M., Yoo, S.-M., Park, S.: Black Hole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference, Huntsville, AL, USA, pp. 96–97. ACM Press, New York (2004)CrossRefGoogle Scholar
  3. 3.
    Bucher, T.: Modellierung und Analyse von Angriffen auf Routingverfahren in mobilen Ad-hoc-Netzen, Diploma Thesis. Master’s thesis, Technische Universität Darmstadt (December 2005)Google Scholar
  4. 4.
    Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  5. 5.
    Jahnke, M., Toelle, J.: Bedrohungsanalyse taktischer MANETs mittels Attack Trees. Technical report, Forschungsgesellschaft für Angewandte Naturwissenschaften e.V (FGAN), Wachtberg, Germany (to appear in summer, 2006)Google Scholar
  6. 6.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, pp. 259–268. ACM Press, New York (2004)CrossRefGoogle Scholar
  7. 7.
    Charles, E., Perkins, E.M.: Belding-Royer, and Samir R. Das. Ad hoc On-Demand Distance Vector (AODV) Routing, July, RFC 3561 (2003)Google Scholar
  8. 8.
    Raffo, D.: Security Schemes for the OLSR Protocol for Ad Hoc Networks. PhD thesis, Université Paris 6 (September 2005), http://perso.crans.org/raffo/papers/raffo-phdthesis.pdf
  9. 9.
    Schneier, B.: Attack Trees - Modeling Security Threats. Dr. Dobb’s Journal 24(12), 21–29 (1999)Google Scholar
  10. 10.
    Schreiber, F.R.: Sybil: The True Story of a Woman Possessed by 16 Separate Personalities, 1st edn. Henry Regnery Co., Chicago (1973)Google Scholar
  11. 11.
    Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, pp. 51–60. ACM Press, New York (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Peter Ebinger
    • 1
  • Tobias Bucher
    • 1
  1. 1.Security Technology DepartmentFraunhofer Institute for Computer Graphics Research IGDDarmstadtGermany

Personalised recommendations