Abstract
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. In this article primary attack methods (black hole, wormhole, rushing, and Sybil) to MANET routing using the Ad-hoc On-demand Distance Vector (AODV) protocol are modelled and analyzed in a consistent way. This process comprises a semi-formal analysis of pre-conditions (costs, probability of success, required skills) and resulting damage from each attack by means of attack trees. We thereby get a uniform way of modelling and analyzing various attacks to MANET routing that allows to directly compare the different attacks and to assess the risks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of Service Resilience in Ad Hoc Networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, Philadelphia, PA, USA, pp. 202–215. ACM Press, New York (2004)
Al-Shurman, M., Yoo, S.-M., Park, S.: Black Hole Attack in Mobile Ad Hoc Networks. In: Proceedings of the 42nd Annual ACM Southeast Regional Conference, Huntsville, AL, USA, pp. 96–97. ACM Press, New York (2004)
Bucher, T.: Modellierung und Analyse von Angriffen auf Routingverfahren in mobilen Ad-hoc-Netzen, Diploma Thesis. Master’s thesis, Technische Universität Darmstadt (December 2005)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Jahnke, M., Toelle, J.: Bedrohungsanalyse taktischer MANETs mittels Attack Trees. Technical report, Forschungsgesellschaft für Angewandte Naturwissenschaften e.V (FGAN), Wachtberg, Germany (to appear in summer, 2006)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, pp. 259–268. ACM Press, New York (2004)
Charles, E., Perkins, E.M.: Belding-Royer, and Samir R. Das. Ad hoc On-Demand Distance Vector (AODV) Routing, July, RFC 3561 (2003)
Raffo, D.: Security Schemes for the OLSR Protocol for Ad Hoc Networks. PhD thesis, Université Paris 6 (September 2005), http://perso.crans.org/raffo/papers/raffo-phdthesis.pdf
Schneier, B.: Attack Trees - Modeling Security Threats. Dr. Dobb’s Journal 24(12), 21–29 (1999)
Schreiber, F.R.: Sybil: The True Story of a Woman Possessed by 16 Separate Personalities, 1st edn. Henry Regnery Co., Chicago (1973)
Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, pp. 51–60. ACM Press, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ebinger, P., Bucher, T. (2006). Modelling and Analysis of Attacks on the MANET Routing in AODV. In: Kunz, T., Ravi, S.S. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2006. Lecture Notes in Computer Science, vol 4104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814764_24
Download citation
DOI: https://doi.org/10.1007/11814764_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37246-2
Online ISBN: 978-3-540-37248-6
eBook Packages: Computer ScienceComputer Science (R0)