Avaliação do Impacto da Ação Maliciosa de Nós no Roteamento em Redes Ad Hoc

  • Luiz Gustavo S. Rocha UFRJ
  • Luís Henrique M. K. Costa UFRJ
  • Otto Carlos M. B. Duarte UFRJ

Abstract


Meeting security requirements is essential to spread the use of ad hoc networks in hostile environment applications. This paper analyzes attacks that exploit the vulnerabilities of the ad hoc routing mechanisms. The attacks are based on the malicious behavior of some network nodes, regarding the forwarding of control messages. AODV is the routing protocol studied. AODV is a reactive protocol where each node act as a router and routes are setup on demand, therefore the malicious behavior of some nodes may affect the whole network performance. The paper presents the results of the malicious nodes’ action and identifies the most sensitive attack points that degrade the total network performance regarding the data packet delivery rate.

References

Corson, S. and Macker, J. (1999). Mobile Ad hoc Networking (MANET) Routing Protocol Performance Issues and Evaluation Considerations. http://www.ietf.org/rfc/rfc2501.txt.

Deng, H., Li, W., and Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10):70–75.

Haas, Z. J. and Zhou, L. (1999). Securing ad hoc networks. IEEE Network Magazine, 13(6):24–30.

Hubaux, J., Buttyan, L., and Capkun, S. (2001). The quest for security in mobile ad hoc networks. In ACM International Symposium on Mobile Ad Hoc Networking and Computing MobiHoc.

Karpijoki, V. (2001). Security in ad hoc networks. Technical report, Department of Computer Science, Helsinki University of Technology.

Marti, S., Giuli, T. J., Lai, K., and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In ACM International Conference on Mobile Computing and Networking MobiCom.

Perkins, C. E., Belding-Royer, E. M., and Das, S. R. (2002). Ad Hoc On-Demand Distance Vector (AODV) Routing. http://www.ietf.org/internet-drafts/draft-ietf-manetaodv-12.txt.

Perkins, C. E. and Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM Conference of the Special Interest Group on Data Communication SIGCOMM.

Perkins, C. E., Royer, E. M., Das, S. R., and Marina, M. K. (2001). Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Personal Communications, 8(1):16–28.

Royer, E. M. and Toh, C.-K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2):46–55.

Vanhala, A. (2000). Security in ad hoc networks. Technical report, Department of Computer Science, University of Helsinki.
Published
2003-05-01
ROCHA, Luiz Gustavo S.; COSTA, Luís Henrique M. K.; DUARTE, Otto Carlos M. B.. Avaliação do Impacto da Ação Maliciosa de Nós no Roteamento em Redes Ad Hoc. In: BRAZILIAN SYMPOSIUM ON INFORMATION AND COMPUTATIONAL SYSTEMS SECURITY (SBSEG), 3. , 2003, Natal. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2003 . p. 56-63. DOI: https://doi.org/10.5753/sbseg.2003.21250.

Most read articles by the same author(s)

1 2 > >>