IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003.
DOI: 10.1109/smcsia.2003.1232402
|View full text |Cite
|
Sign up to set email alerts
|

How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols

Abstract: This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals and then studies how to achieve these goals through misuses of the routing messages. To facilitate the analysis, this paper classifies the insider attacks into two categories: atomic misuses and compound misuses. Atomic misuses are performed by manipulating a single routing message, which cannot be … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 114 publications
(53 citation statements)
references
References 9 publications
0
53
0
Order By: Relevance
“…The following list illustrates a set of attacks described in [7], [8], followed by a short description of the IDS solution to contrast each attack type:…”
Section: Appendixmentioning
confidence: 99%
“…The following list illustrates a set of attacks described in [7], [8], followed by a short description of the IDS solution to contrast each attack type:…”
Section: Appendixmentioning
confidence: 99%
“…An insider is someone who is authorized to use computers and networks [Sch02]; 2. An insider has access to the keying materials or full control of some nodes [NS05]; 3. An insider has "access, privilege, or knowledge of information systems and services" ([BA04], p. 10) 4.…”
Section: Introductionmentioning
confidence: 99%
“…A number of attacks on AODV have been proposed in the literature [6], [27], [30]. Ning et al [20] propose a taxonomy of attacks on the AODV protocol. Our authentication framework described in Section V adapts some security mechanisms used in ARAN [27] and SAODV [33] for securing MAODV.…”
Section: Related Workmentioning
confidence: 99%
“…Hence, in the design of a secure multicast routing protocol, it is necessary to take into account the possibility of malicious insiders, and to develop security mechanisms that can prevent attacks by such insiders. Previously, Ning et al [20] have presented a systematic study of insider attacks on AODV [22]. To the best of our knowledge, however, the impact of insider attacks on MAODV has not been studied.…”
Section: Introductionmentioning
confidence: 99%