Skip to main content

Modelling and Analysis of Attacks on the MANET Routing in AODV

  • Conference paper
Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4104))

Included in the following conference series:

Abstract

Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. In this article primary attack methods (black hole, wormhole, rushing, and Sybil) to MANET routing using the Ad-hoc On-demand Distance Vector (AODV) protocol are modelled and analyzed in a consistent way. This process comprises a semi-formal analysis of pre-conditions (costs, probability of success, required skills) and resulting damage from each attack by means of attack trees. We thereby get a uniform way of modelling and analyzing various attacks to MANET routing that allows to directly compare the different attacks and to assess the risks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of Service Resilience in Ad Hoc Networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, Philadelphia, PA, USA, pp. 202–215. ACM Press, New York (2004)

    Chapter  Google Scholar 

  2. Al-Shurman, M., Yoo, S.-M., Park, S.: Black Hole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference, Huntsville, AL, USA, pp. 96–97. ACM Press, New York (2004)

    Chapter  Google Scholar 

  3. Bucher, T.: Modellierung und Analyse von Angriffen auf Routingverfahren in mobilen Ad-hoc-Netzen, Diploma Thesis. Master’s thesis, Technische Universität Darmstadt (December 2005)

    Google Scholar 

  4. Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Jahnke, M., Toelle, J.: Bedrohungsanalyse taktischer MANETs mittels Attack Trees. Technical report, Forschungsgesellschaft für Angewandte Naturwissenschaften e.V (FGAN), Wachtberg, Germany (to appear in summer, 2006)

    Google Scholar 

  6. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, pp. 259–268. ACM Press, New York (2004)

    Chapter  Google Scholar 

  7. Charles, E., Perkins, E.M.: Belding-Royer, and Samir R. Das. Ad hoc On-Demand Distance Vector (AODV) Routing, July, RFC 3561 (2003)

    Google Scholar 

  8. Raffo, D.: Security Schemes for the OLSR Protocol for Ad Hoc Networks. PhD thesis, Université Paris 6 (September 2005), http://perso.crans.org/raffo/papers/raffo-phdthesis.pdf

  9. Schneier, B.: Attack Trees - Modeling Security Threats. Dr. Dobb’s Journal 24(12), 21–29 (1999)

    Google Scholar 

  10. Schreiber, F.R.: Sybil: The True Story of a Woman Possessed by 16 Separate Personalities, 1st edn. Henry Regnery Co., Chicago (1973)

    Google Scholar 

  11. Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, pp. 51–60. ACM Press, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ebinger, P., Bucher, T. (2006). Modelling and Analysis of Attacks on the MANET Routing in AODV. In: Kunz, T., Ravi, S.S. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2006. Lecture Notes in Computer Science, vol 4104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814764_24

Download citation

  • DOI: https://doi.org/10.1007/11814764_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37246-2

  • Online ISBN: 978-3-540-37248-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics