Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A General Cooperative Intrusion Detection Architecture for MANETs
IWIA '05 Proceedings of the Third IEEE International Workshop on Information Assurance
An EFSM-based intrusion detection system for ad hoc networks
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Hi-index | 0.00 |
In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages. The analysis shows that three misuse actions on the routing messages, including drop, modify and forward, and active forge, enable the malicious attacker to conduct real time attacks on TORA protocol. We demonstrate the attacks using NS-2 software and then analyze the simulation results. The simulation results verify our analysis and we observe that through certain misuses, an inside attacker can degrade the network performance, disrupting the route creation process and consume scarce network resource.