Avaliação do Impacto da Ação Maliciosa de Nós no Roteamento em Redes Ad Hoc
Abstract
Meeting security requirements is essential to spread the use of ad hoc networks in hostile environment applications. This paper analyzes attacks that exploit the vulnerabilities of the ad hoc routing mechanisms. The attacks are based on the malicious behavior of some network nodes, regarding the forwarding of control messages. AODV is the routing protocol studied. AODV is a reactive protocol where each node act as a router and routes are setup on demand, therefore the malicious behavior of some nodes may affect the whole network performance. The paper presents the results of the malicious nodes’ action and identifies the most sensitive attack points that degrade the total network performance regarding the data packet delivery rate.
References
Deng, H., Li, W., and Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10):70–75.
Haas, Z. J. and Zhou, L. (1999). Securing ad hoc networks. IEEE Network Magazine, 13(6):24–30.
Hubaux, J., Buttyan, L., and Capkun, S. (2001). The quest for security in mobile ad hoc networks. In ACM International Symposium on Mobile Ad Hoc Networking and Computing MobiHoc.
Karpijoki, V. (2001). Security in ad hoc networks. Technical report, Department of Computer Science, Helsinki University of Technology.
Marti, S., Giuli, T. J., Lai, K., and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In ACM International Conference on Mobile Computing and Networking MobiCom.
Perkins, C. E., Belding-Royer, E. M., and Das, S. R. (2002). Ad Hoc On-Demand Distance Vector (AODV) Routing. http://www.ietf.org/internet-drafts/draft-ietf-manetaodv-12.txt.
Perkins, C. E. and Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM Conference of the Special Interest Group on Data Communication SIGCOMM.
Perkins, C. E., Royer, E. M., Das, S. R., and Marina, M. K. (2001). Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Personal Communications, 8(1):16–28.
Royer, E. M. and Toh, C.-K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2):46–55.
Vanhala, A. (2000). Security in ad hoc networks. Technical report, Department of Computer Science, University of Helsinki.