IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Black hole attack in mobile Ad Hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Misuse detection in consent-based networks
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Hi-index | 0.00 |
Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio communication. In the past various types of MANET attacks have been detected and analyzed. In this article primary attack methods (black hole, wormhole, rushing, and Sybil) to MANET routing using the Ad-hoc On-demand Distance Vector (AODV) protocol are modelled and analyzed in a consistent way. This process comprises a semi-formal analysis of pre-conditions (costs, probability of success, required skills) and resulting damage from each attack by means of attack trees. We thereby get a uniform way of modelling and analyzing various attacks to MANET routing that allows to directly compare the different attacks and to assess the risks.