Abstract
The lack of infrastructure and centralized nodes in ad hoc networks have made nodes to depend on the cooperative nature of neighbor nodes for critical services like routing and maintenance. This unique cooperative nature of ad hoc network’s routing mechanism has spawned unprecedented security threats in the routing protocol. Attackers have the potential to directly disrupt the routing protocol communications, which is transparent in conventional wired and wireless networks. A routing attack scenario is composed of a sequence of attack behaviors, and an attack behavior is a sequence of elementary attack behaviors, which is executed in particular fashion. The chapter enumerates in detail the routing attack scenarios and their elements. Also, the chapter introduces a security threat analysis that is used to explore different attack scenarios and behaviors in ad hoc routing protocols. The observations made in the threat analysis are useful for understanding the security vulnerabilities and realizing the requisites of a security system design for ad hoc networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Keng Seng, N. and W.K.G. Seah. Routing security and data confidentiality for mobile ad hoc networks. The 57th Semi-annual Vehicular Technology Conference. 2003. 3: 1821–1825.
Lidong, Z. and Z.J. Haas. Securing ad hoc networks. Network, IEEE, 1999. 13(6): 24–30.
Brutch, P. and C. Ko. Challenges in intrusion detection for wireless ad-hoc networks. in Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. 2003.
Hubaux., J.-P., L. Buttyan., and S. Capkun. The Quest for Security in Mobile Ad hoc Networks. in 2nd ACM international Symposium on Mobile Ad hoc Networking & Computing. 2001. Long Beach, CA, USA: ACM Press.
Papadimitratos., P. and Z. Haas. Secure Routing for Mobile Ad hoc Networks. in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002). 2002. San Antonio, TX.
Huang, Y.A. and W. Lee. Attack analysis and detection for ad hoc routing protocols, in Recent Advances in Intrusion Detection, Proceedings. 2004, Springer-Verlag Berlin: Berlin, p. 125–145.
Ning, P. and K. Sun. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Networks, 2005. 3(6): 795–819.
Kong, J., X. Hong, and M. Gerla. A new set of passive routing attacks in mobile ad hoc networks. in Military Communications Conference, 2003. MILCOM 2003. IEEE. 2003.
Awerbuch., B., et al. Mitigating Byzantine Attacks in Ad Hoc Wireless Networks. March 2004, Department of Computer Science, John Hopkins University.
Tseng, H.C. and B.J. Culpepper. Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators. Computers & Security, 2005. 24(7): 561–570.
Song, N., L. Qian, and X. Li. Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach. in Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International. 2005.
Clausen, T. and P. Jacquet. Optimized Link State Routing Protocol. RFC 3626, October 2003.
Tonnesen., A. Implementing and Extending Optimized Link State Routing Protocol, in UniK University Graduate Center, University of Oslo. p. 150.
Wong, K.D., T.J. Kwon, and V. Varma. Towards commercialization of ad hoc networks. 2004. 2: 1207–1211.
Anjum, F. and P. Mouchtaris. Security for wireless Ad hoc networks. 2007. Wiley.
Bangnan, X., S. Hischke, and B. Walke. The role of ad hoc networking in future wireless communications. IEEE Network. 2003. 2: 1353–1358.
Yang., S. and J.S. Baras. Modeling vulnerabilities of ad hoc routing protocols. in 1st ACM workshop on Security of ad hoc and sensor networks. 2003. Fairfax, Virginia: ACM Press.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this chapter
Cite this chapter
Joseph, J.F.C., Das, A., Lee, BS. (2009). Security Threats in Ad Hoc Routing Protocols. In: Misra, S., Woungang, I., Chandra Misra, S. (eds) Guide to Wireless Ad Hoc Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84800-328-6_18
Download citation
DOI: https://doi.org/10.1007/978-1-84800-328-6_18
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-84800-327-9
Online ISBN: 978-1-84800-328-6
eBook Packages: Computer ScienceComputer Science (R0)