Skip to main content

Security Threats in Ad Hoc Routing Protocols

  • Chapter
  • First Online:
Book cover Guide to Wireless Ad Hoc Networks

Abstract

The lack of infrastructure and centralized nodes in ad hoc networks have made nodes to depend on the cooperative nature of neighbor nodes for critical services like routing and maintenance. This unique cooperative nature of ad hoc network’s routing mechanism has spawned unprecedented security threats in the routing protocol. Attackers have the potential to directly disrupt the routing protocol communications, which is transparent in conventional wired and wireless networks. A routing attack scenario is composed of a sequence of attack behaviors, and an attack behavior is a sequence of elementary attack behaviors, which is executed in particular fashion. The chapter enumerates in detail the routing attack scenarios and their elements. Also, the chapter introduces a security threat analysis that is used to explore different attack scenarios and behaviors in ad hoc routing protocols. The observations made in the threat analysis are useful for understanding the security vulnerabilities and realizing the requisites of a security system design for ad hoc networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Keng Seng, N. and W.K.G. Seah. Routing security and data confidentiality for mobile ad hoc networks. The 57th Semi-annual Vehicular Technology Conference. 2003. 3: 1821–1825.

    Google Scholar 

  2. Lidong, Z. and Z.J. Haas. Securing ad hoc networks. Network, IEEE, 1999. 13(6): 24–30.

    Article  Google Scholar 

  3. Brutch, P. and C. Ko. Challenges in intrusion detection for wireless ad-hoc networks. in Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. 2003.

    Google Scholar 

  4. Hubaux., J.-P., L. Buttyan., and S. Capkun. The Quest for Security in Mobile Ad hoc Networks. in 2nd ACM international Symposium on Mobile Ad hoc Networking & Computing. 2001. Long Beach, CA, USA: ACM Press.

    Google Scholar 

  5. Papadimitratos., P. and Z. Haas. Secure Routing for Mobile Ad hoc Networks. in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002). 2002. San Antonio, TX.

    Google Scholar 

  6. Huang, Y.A. and W. Lee. Attack analysis and detection for ad hoc routing protocols, in Recent Advances in Intrusion Detection, Proceedings. 2004, Springer-Verlag Berlin: Berlin, p. 125–145.

    Book  Google Scholar 

  7. Ning, P. and K. Sun. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks, 2005. 3(6): 795–819.

    Article  Google Scholar 

  8. Kong, J., X. Hong, and M. Gerla. A new set of passive routing attacks in mobile ad hoc networks. in Military Communications Conference, 2003. MILCOM 2003. IEEE. 2003.

    Google Scholar 

  9. Awerbuch., B., et al. Mitigating Byzantine Attacks in Ad Hoc Wireless Networks. March 2004, Department of Computer Science, John Hopkins University.

    Google Scholar 

  10. Tseng, H.C. and B.J. Culpepper. Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators. Computers & Security, 2005. 24(7): 561–570.

    Article  Google Scholar 

  11. Song, N., L. Qian, and X. Li. Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach. in Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International. 2005.

    Google Scholar 

  12. Clausen, T. and P. Jacquet. Optimized Link State Routing Protocol. RFC 3626, October 2003.

    Google Scholar 

  13. Tonnesen., A. Implementing and Extending Optimized Link State Routing Protocol, in UniK University Graduate Center, University of Oslo. p. 150.

    Google Scholar 

  14. Wong, K.D., T.J. Kwon, and V. Varma. Towards commercialization of ad hoc networks. 2004. 2: 1207–1211.

    Google Scholar 

  15. Anjum, F. and P. Mouchtaris. Security for wireless Ad hoc networks. 2007. Wiley.

    Google Scholar 

  16. Bangnan, X., S. Hischke, and B. Walke. The role of ad hoc networking in future wireless communications. IEEE Network. 2003. 2: 1353–1358.

    Google Scholar 

  17. Yang., S. and J.S. Baras. Modeling vulnerabilities of ad hoc routing protocols. in 1st ACM workshop on Security of ad hoc and sensor networks. 2003. Fairfax, Virginia: ACM Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John Felix Charles Joseph .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag London Limited

About this chapter

Cite this chapter

Joseph, J.F.C., Das, A., Lee, BS. (2009). Security Threats in Ad Hoc Routing Protocols. In: Misra, S., Woungang, I., Chandra Misra, S. (eds) Guide to Wireless Ad Hoc Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84800-328-6_18

Download citation

  • DOI: https://doi.org/10.1007/978-1-84800-328-6_18

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84800-327-9

  • Online ISBN: 978-1-84800-328-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics