A specification-based intrusion detection system for AODV

  • Authors:
  • Chin-Yang Tseng;Poornima Balasubramanyam;Calvin Ko;Rattapon Limprasittiporn;Jeff Rowe;Karl Levitt

  • Affiliations:
  • University of California, Davis;University of California, Davis;Network Associates, Inc.;University of California, Davis;University of California, Davis;University of California, Davis

  • Venue:
  • Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Ad hoc On-Demand Distance Vector (AODV) routing protocol, designed for mobile ad hoc networks, offers quick adaptation to dynamic link conditions, low processing and memory overhead, and low network utilization. However, without keeping in mind the security issues in the protocol design, AODV is vulnerable to various kinds of attacks. This paper analyzes some of the vulnerabilities, specifically discussing attacks against AODV that manipulate the routing messages. We propose a solution based on specification-based intrusion detection to detect attacks on AODV. Briefly, our approach involves the use of finite state machines for specifying correct AODV routing behavior and distributed network monitors for detecting run-time violation of the specifications. In addition, one additional field in the protocol message is proposed to enable the monitoring. We illustrate that our algorithm, which employs a tree data structure, can effectively detect most of the serious attacks in real time and with minimum overhead.