fulltext_3 - Modelling and Analysis of Attacks on the MANET...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Modelling and Analysis of Attacks on the MANET Routing in AODV Peter Ebinger and Tobias Bucher Fraunhofer Institute for Computer Graphics Research IGD Security Technology Department Fraunhoferstr. 5 64283 Darmstadt, Germany { peter.ebinger, tobias.bucher } @igd.fraunhofer.de Abstract. Mobile ad-hoc networks (MANETs) are especially vulner- able to attacks because of lacking infrastructure and data transfer us- ing radio communication. In the past various types of MANET attacks have been detected and analyzed. In this article primary attack meth- ods (black hole, wormhole, rushing, and Sybil) to MANET routing using the Ad-hoc On-demand Distance Vector (AODV) protocol are modelled and analyzed in a consistent way. This process comprises a semi-formal analysis of pre-conditions (costs, probability of success, required skills) and resulting damage from each attack by means of attack trees. We thereby get a uniform way of modelling and analyzing various attacks to MANET routing that allows to directly compare the different attacks and to assess the risks. 1 Introduction Mobile ad-hoc networks (MANETs) are especially vulnerable to attack due to the lack of infrastructure. In addition, because data is transferred wirelessly it can easily be intercepted or interfered with. Network topology is permanently changing due to the mobility of the involved nodes. Finally, restricted energy supply and limited computational power narrow down the use of complex secu- rity mechanisms. In the past various types of MANET attacks have been detected and analyzed. In each case, an identified attack tied to a particular protocol was examined and treated with individualized responses (e.g. black hole [1,2,8], wormhole [11] or Sybil [6] [4]). Until now no comprehensive conspectus of the different attacks has been carried out with a comparative evaluation for a routing protocol. It is the aim of this article to model and analyze primary attacks to MANET routing in a consistent way. By means of attack trees [9] the different attack types are split into segments and modelled in a (semi-)formal way. Attack trees enable an analysis of each aspect using specific parameter values while attaching the necessary pre-conditions (including effort, the probability of success and the necessary skills) each attack requires to be successful. Damages that can result from of a successful attack are also examined. T. Kunz and S.S. Ravi (Eds.): ADHOC-NOW 2006, LNCS 4104, pp. 294–307, 2006. c Springer-Verlag Berlin Heidelberg 2006 Modelling and Analysis of Attacks on the MANET Routing in AODV 295 The MANET routing protocol AODV (Ad-hoc On-demand Distance Vector Routing Protocol) is investigated, which has been adopted by the IETF as RFC [7] (with active further development)....
View Full Document

{[ snackBarMessage ]}

Page1 / 14

fulltext_3 - Modelling and Analysis of Attacks on the MANET...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online