Skip to main content

Design and Implementation of a Testbed for the Security Assessment of MANETs

  • Conference paper
Cyberspace Safety and Security (CSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8300))

Included in the following conference series:

  • 2471 Accesses

Abstract

A MANET (Mobile Ad-hoc NETwork) is a self-configuring network of mobile devices connected by wireless links. Given its structure, a MANET has no clear line of defence, so it is accessible to both legitimate network users and malicious attackers. For this reason, MANETs are vulnerable to security attacks, mainly related to the poisoning of the routing protocols. The focus of this paper is two-folded, on one hand it presents a survey of the most significant attacks towards MANETs and on the other hand it details the design and implementation of an experimental testbed for assessing the security of a MANET, by allowing to perform the described attacks. The obtained results have shown that, in some cases, the purely theoretically described attacks presented in the literature, are in fact not realisable because of some “real world” operation details left unconsidered in the original paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security (2008)

    Google Scholar 

  2. Vidhya, K.U., Priya, M.M.: A novel technique for defending routing attacks in OLSR MANET. In: IEEE International Conference on Computational Intelligence and Computing Research (2010)

    Google Scholar 

  3. Irshad Ullah Shoaib Ur Rehman. Analysis of black hole attack on MANETs using different MANET routing protocols. Master’s thesis, School of Computing Blekinge Institute of Technology, Sweden (2010)

    Google Scholar 

  4. Yau, P.-W., Hu, S., Mitchell, C.J.: Malicious attacks on ad hoc network routing protocols. International Journal of Computer Research (2009)

    Google Scholar 

  5. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC 3561 (2003)

    Google Scholar 

  6. Gorantala, K.: Routing protocols in mobile ad-hoc netwoks. Master’s thesis, Umeå University (2006)

    Google Scholar 

  7. Clausen, T., Jacquet, P.: Optimized Link State Routing Protocol (OLSR). IETF RFC 3626 (2003)

    Google Scholar 

  8. Olsr link quality extensions, http://www.olsr.org/docs/README-Link-Quality.html

  9. Jawandhiya, P.M., Ghonge, M.M., Ali, M.S., Deshpande, J.S.: A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology (2010)

    Google Scholar 

  10. Aad, I., Hubaux, J.-P., Knightly, E.W.: Impact of denial of service attacks on ad hoc networks. IEEE/ACM Transactions on Networking (2008)

    Google Scholar 

  11. Seshadri Ramana, K., Chari, A.A., Kasiviswanth, N.: Review and analysis of trust based routing in MANETs. International Journal of Computer Science and Research (2010)

    Google Scholar 

  12. Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. In: Proceedings of the International Conference on Networking (2006)

    Google Scholar 

  13. Lacharité, Y., Wang, M., Lamont, L.: Findings on a Semantically-Based Intrusion Detection Approach for OLSR MANET Protocol. In: 3rd OLSR Interop / Workshop (2006)

    Google Scholar 

  14. Goyal, P., Batra, S., Singh, A.: A literature review of security attack in mobile ad-hoc networks. International Journal of Computer Applications (2010)

    Google Scholar 

  15. Bensaou, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Communications Magazine (2008)

    Google Scholar 

  16. Hu, Y.-C., Perrig, A.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications (2006)

    Google Scholar 

  17. Khalil, I., Bagchi, S., Shroff, N.B.: Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Proceedings of the 2005 IEEE International Conference on Dependable Systems and Networks (2005)

    Google Scholar 

  18. Lynch, D., Knight, S., Gorlatova, M.A., Lacharité, Y., Lamont, L., Liscano, R., Mason, P.C.: Providing effective security in mobile ad hoc networks without affecting bandwidth or interoperability. In: Proceedings of the 26th Army Science Conference (2008)

    Google Scholar 

  19. Razak, S.A., Furnell, S.M., Brooke, P.J.: Attacks against mobile ad hoc networks routing protocols. Proceedings of 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting (2004)

    Google Scholar 

  20. Ebinger, P., Bucher, T.: Modelling and Analysis of Attacks on the MANET Routing in AODV. In: Proceedings of the 5th International Conference on Ad-Hoc, Mobile, and Wireless Networks (2006)

    Google Scholar 

  21. Khokhar, R.H., Ngadi, M.A., Mandala, S.: A review of current routing attacks in mobile ad hoc networks. International Journal of Computer Science and Security (2008)

    Google Scholar 

  22. Sharma, S., Gupta, R.: Simulation study of blackhole attack in the Mobile Ad hoc Networks. Journal of Engineering Science and Technology (2009)

    Google Scholar 

  23. Gerhards-Padilla, E., Aschenbruck, N., Martini, P., Jahnke, M., Tolle, J.: Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs. In: 32nd IEEE Conference on Local Computer Networks (2007)

    Google Scholar 

  24. Adjih, C., Raffo, D., Mhlethaler, P.: Attacks Against OLSR: Distributed Key Management for Security. In: 2nd OLSR Interop/Workshop (2005)

    Google Scholar 

  25. Rai, A.K., Tewari, R.R., Upadhyay, S.K.: Different types of attacks on integrated MANET-internet communication. International Journal of Computer Science and Security (2010)

    Google Scholar 

  26. Zhang, Y., Huang, Y.A., Lee, W.: An extensible environment for evaluating secure MANET. In: International Conference on Security and Privacy for Emerging Areas on Communication Networks (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Callegari, C., Giordano, S., Mannella, S., Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03584-0_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03583-3

  • Online ISBN: 978-3-319-03584-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics