How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols

  • Authors:
  • Ning, P; Sun, K

  • Affiliations:
  • -;-

  • Venue:
  • How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals and then study how to achieve these goals through misuses of the routing messages. To facilitate the analysis, this paper classifies the insider attacks into two categories: {\em atomic misuses} and {\em compound misuses}. Atomic misuses are performed by manipulating a single routing message, which cannot be further divided; compound misuses are composed of combinations of atomic misuses and possibly normal uses of the routing protocol. The analysis results in this paper reveal several classes of insider attacks, including {\em route disruption, route invasion, node isolation,} and {\em resource consumption}. This paper also includes simulation results that demonstrate the impact of these attacks.