Abstract
A mobile ad hoc network is made of a collection of nodes connected through a wireless medium and form a wireless multihop network with possible changing topologies. The widely accepted existing muting protocols designed to accommodate the needs of such self-organized networks do not address possible threats or attacks aiming at the disruption of the protocol itself. The widely assumed trusted environment is not really the environment that can be realistically expected in reality. In this paper, we describe a new attack against routing protocols which we call virtual link attack, where a misbehaving node tries to relay any Hello message originated from its neighbors aiming to create fake symmetric links in the network. We show that this attack can severely compromise any muting protocol and may lead to large data packets loss. We specifically analyze this attack under the Optimized Link State Routing (OLSR) protocol in detail and devise a Symmetric Neighbor Verification Protocol (SNVP) to alleviate its impact and severity.
Original language | English |
---|---|
Title of host publication | AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 355-360 |
Number of pages | 6 |
ISBN (Electronic) | 9781424419685 |
ISBN (Print) | 9781424419678 |
DOIs | |
Publication status | Published - 22 Apr 2008 |
Externally published | Yes |
Event | 6th IEEE/ACS International Conference on Computer Systems and Applications - Doha, Qatar Duration: 31 Mar 2008 → 4 Apr 2008 Conference number: 6 |
Publication series
Name | IEEE/ACS International Conference on Computer Systems and Applications |
---|---|
Publisher | IEEE |
ISSN (Print) | 2161-5322 |
ISSN (Electronic) | 2161-5330 |
Conference
Conference | 6th IEEE/ACS International Conference on Computer Systems and Applications |
---|---|
Abbreviated title | AICCSA 2008 |
Country/Territory | Qatar |
City | Doha |
Period | 31/03/08 → 4/04/08 |