Avoiding virtual link attacks in wireless ad hoc networks.

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

7 Citations (Scopus)

Abstract

A mobile ad hoc network is made of a collection of nodes connected through a wireless medium and form a wireless multihop network with possible changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats or attacks aiming at the disruption of the protocol itself. The widely assumed trusted environment is not really the environment that can be realistically expected in reality. In this paper, we describe a new attack against routing protocols which we call virtual link attack, where a misbehaving node tries to relay any Hello message originated from its neighbors aiming to create fake symmetric links in the network. We show that this attack can severely compromise any routing protocol and may lead to large data packets loss. We specifically analyze this attack under the optimized link state routing (OLSR) protocol in detail and devise a symmetric neighbor verification protocol (SNVP) to alleviate its impact and severity.
Original languageEnglish
Title of host publication 2008 IEEE/ACS International Conference on Computer Systems and Applications
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages355-360
Number of pages6
ISBN (Print)9781424419678, 9781424419685
DOIs
Publication statusPublished - 22 Apr 2008
Externally publishedYes
Event6th ACS/IEEE International Conference on Computer Systems and Applications - Doha, Qatar
Duration: 31 Mar 20084 Apr 2008
https://dblp.org/db/conf/aiccsa/aiccsa2008.html#DjahelN08

Publication series

Name
PublisherIEEE
ISSN (Print)2161-5322
ISSN (Electronic)2161-5330

Conference

Conference6th ACS/IEEE International Conference on Computer Systems and Applications
Abbreviated titleAICCSA 2008
Country/TerritoryQatar
CityDoha
Period31/03/084/04/08
Internet address

Fingerprint

Dive into the research topics of 'Avoiding virtual link attacks in wireless ad hoc networks.'. Together they form a unique fingerprint.

Cite this