Vulnerability Analysis of the Simple Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc Networks

If deployments of Mobile Ad Hoc Networks (MANETs) are to become common outside of purely experimental settings, protocols operating such MANETs must be able to preserve network integrity, even when faced with careless or malicious participants. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol(s), managing the connectivity. Understanding how these routing protocols can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. One routing protocol for MANETs, developed by the Internet Engineering Task Force (IETF) as a multicast routing protocol for efficient data dissemination, is denoted ``Simplified Multicast Forwarding'' (SMF). This protocol is analyzed, and its vulnerabilities described, in this paper. SMF consists of two independent components: (i) duplicate packet detection and (ii) relay set selection, each of which presents its own set of vulnerabilities that an attacker may exploit to compromise network integrity. This paper explores vulnerabilities in each of these, with the aim of identifying attack vectors and thus enabling development of countermeasures.

[1]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[2]  Stephen T. Kent,et al.  IP Authentication Header , 1995, RFC.

[3]  Thomas H. Clausen,et al.  Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2) , 2010, ArXiv.

[4]  Philippe Jacquet,et al.  Diffusion Mechanisms for Multimedia Broadcasting in Mobile Ad Hoc Networks , 2004 .

[5]  Richard G. Ogier,et al.  Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding , 2009, RFC.

[6]  Fred L. Templin,et al.  Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) , 2004, RFC.

[7]  Philippe Jacquet,et al.  Optimizing Route Length in Reactive Protocols for Ad Hoc Networks , 2002 .

[8]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[9]  Gregory A. Hansen,et al.  The Optimized Link State Routing Protocol , 2003 .

[10]  Philippe Jacquet,et al.  Internet Engineering Task Force (ietf) the Optimized Link State Routing Protocol Version 2 , 2022 .

[11]  Thomas Clausen,et al.  Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2 , 2010 .

[12]  Thomas H. Clausen,et al.  Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) , 2011, RFC.

[13]  Joseph P. Macker,et al.  Simplified Multicast Forwarding , 2012, RFC.

[14]  Yu-Chee Tseng,et al.  The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.

[15]  Anis Laouiti,et al.  Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks , 2000 .

[16]  Philippe Jacquet,et al.  OSPF Multipoint Relay (MPR) Extension for Ad Hoc Networks , 2009, RFC.

[17]  Laurent Viennot,et al.  Investigating data broadcast performance in mobile ad-hoc networks , 2002, The 5th International Symposium on Wireless Personal Multimedia Communications.

[18]  Cédric Adjih,et al.  Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format , 2009, RFC.