How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols

  • Authors:
  • Peng Ning;Kun Sun

  • Affiliations:
  • Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27695-8207, USA;Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27695-8207, USA

  • Venue:
  • Ad Hoc Networks
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals, and then studies how to achieve these goals through misuses of the routing messages. To facilitate the analysis, it classifies insider attacks into two categories: atomic misuses and compound misuses. Atomic misuses are performed by manipulating a single routing message, which cannot be further divided; compound misuses are composed of combinations of atomic misuses and possibly normal uses of the routing protocol. The analysis results in this paper reveal several classes of insider attacks, including route disruption, route invasion, node isolation, and resource consumption. Finally, this paper presents simulation results that validate and demonstrate the impact of these attacks.