Abstract
A MANET (Mobile Ad-hoc NETwork) is a self-configuring network of mobile devices connected by wireless links. Given its structure, a MANET has no clear line of defence, so it is accessible to both legitimate network users and malicious attackers. For this reason, MANETs are vulnerable to security attacks, mainly related to the poisoning of the routing protocols. The focus of this paper is two-folded, on one hand it presents a survey of the most significant attacks towards MANETs and on the other hand it details the design and implementation of an experimental testbed for assessing the security of a MANET, by allowing to perform the described attacks. The obtained results have shown that, in some cases, the purely theoretically described attacks presented in the literature, are in fact not realisable because of some “real world” operation details left unconsidered in the original paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security (2008)
Vidhya, K.U., Priya, M.M.: A novel technique for defending routing attacks in OLSR MANET. In: IEEE International Conference on Computational Intelligence and Computing Research (2010)
Irshad Ullah Shoaib Ur Rehman. Analysis of black hole attack on MANETs using different MANET routing protocols. Master’s thesis, School of Computing Blekinge Institute of Technology, Sweden (2010)
Yau, P.-W., Hu, S., Mitchell, C.J.: Malicious attacks on ad hoc network routing protocols. International Journal of Computer Research (2009)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC 3561 (2003)
Gorantala, K.: Routing protocols in mobile ad-hoc netwoks. Master’s thesis, Umeå University (2006)
Clausen, T., Jacquet, P.: Optimized Link State Routing Protocol (OLSR). IETF RFC 3626 (2003)
Olsr link quality extensions, http://www.olsr.org/docs/README-Link-Quality.html
Jawandhiya, P.M., Ghonge, M.M., Ali, M.S., Deshpande, J.S.: A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology (2010)
Aad, I., Hubaux, J.-P., Knightly, E.W.: Impact of denial of service attacks on ad hoc networks. IEEE/ACM Transactions on Networking (2008)
Seshadri Ramana, K., Chari, A.A., Kasiviswanth, N.: Review and analysis of trust based routing in MANETs. International Journal of Computer Science and Research (2010)
Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. In: Proceedings of the International Conference on Networking (2006)
Lacharité, Y., Wang, M., Lamont, L.: Findings on a Semantically-Based Intrusion Detection Approach for OLSR MANET Protocol. In: 3rd OLSR Interop / Workshop (2006)
Goyal, P., Batra, S., Singh, A.: A literature review of security attack in mobile ad-hoc networks. International Journal of Computer Applications (2010)
Bensaou, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Communications Magazine (2008)
Hu, Y.-C., Perrig, A.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications (2006)
Khalil, I., Bagchi, S., Shroff, N.B.: Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Proceedings of the 2005 IEEE International Conference on Dependable Systems and Networks (2005)
Lynch, D., Knight, S., Gorlatova, M.A., Lacharité, Y., Lamont, L., Liscano, R., Mason, P.C.: Providing effective security in mobile ad hoc networks without affecting bandwidth or interoperability. In: Proceedings of the 26th Army Science Conference (2008)
Razak, S.A., Furnell, S.M., Brooke, P.J.: Attacks against mobile ad hoc networks routing protocols. Proceedings of 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting (2004)
Ebinger, P., Bucher, T.: Modelling and Analysis of Attacks on the MANET Routing in AODV. In: Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (2006)
Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security (2008)
Sharma, S., Gupta, R.: Simulation study of blackhole attack in the Mobile Ad hoc Networks. Journal of Engineering Science and Technology (2009)
Gerhards-Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., Tolle, J.: Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs. In: 32nd IEEE Conference on Local Computer Networks (2007)
Adjih, C., Raffo, D., Mhlethaler, P.: Attacks Against OLSR: Distributed Key Management for Security. In: 2nd OLSR Interop/Workshop (2005)
Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different types of attacks on integrated MANET-internet communication. International Journal of Computer Science and Security (2010)
Zhang, Y., Huang, Y.A., Lee, W.: An extensible environment for evaluating secure MANET. In: International Conference on Security and Privacy for Emerging Areas on Communication Networks (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Callegari, C., Giordano, S., Mannella, S., Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-03584-0_17
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03583-3
Online ISBN: 978-3-319-03584-0
eBook Packages: Computer ScienceComputer Science (R0)