Avoiding Virtual Link Attacks in Wireless Ad Hoc Networks

Soufiene Djahel, Farid Naït-Abdesselam

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

A mobile ad hoc network is made of a collection of nodes connected through a wireless medium and form a wireless multihop network with possible changing topologies. The widely accepted existing muting protocols designed to accommodate the needs of such self-organized networks do not address possible threats or attacks aiming at the disruption of the protocol itself. The widely assumed trusted environment is not really the environment that can be realistically expected in reality. In this paper, we describe a new attack against routing protocols which we call virtual link attack, where a misbehaving node tries to relay any Hello message originated from its neighbors aiming to create fake symmetric links in the network. We show that this attack can severely compromise any muting protocol and may lead to large data packets loss. We specifically analyze this attack under the Optimized Link State Routing (OLSR) protocol in detail and devise a Symmetric Neighbor Verification Protocol (SNVP) to alleviate its impact and severity.

Original languageEnglish
Title of host publicationAICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages355-360
Number of pages6
ISBN (Electronic)9781424419685
ISBN (Print)9781424419678
DOIs
Publication statusPublished - 22 Apr 2008
Externally publishedYes
Event6th IEEE/ACS International Conference on Computer Systems and Applications - Doha, Qatar
Duration: 31 Mar 20084 Apr 2008
Conference number: 6

Publication series

NameIEEE/ACS International Conference on Computer Systems and Applications
PublisherIEEE
ISSN (Print)2161-5322
ISSN (Electronic)2161-5330

Conference

Conference6th IEEE/ACS International Conference on Computer Systems and Applications
Abbreviated titleAICCSA 2008
Country/TerritoryQatar
CityDoha
Period31/03/084/04/08

Fingerprint

Dive into the research topics of 'Avoiding Virtual Link Attacks in Wireless Ad Hoc Networks'. Together they form a unique fingerprint.

Cite this