Design and Implementation of a Testbed for the Security Assessment of MANETs

A MANET (Mobile Ad-hoc NETwork) is a self-configuring network of mobile devices connected by wireless links. Given its structure, a MANET has no clear line of defence, so it is accessible to both legitimate network users and malicious attackers. For this reason, MANETs are vulnerable to security attacks, mainly related to the poisoning of the routing protocols. The focus of this paper is two-folded, on one hand it presents a survey of the most significant attacks towards MANETs and on the other hand it details the design and implementation of an experimental testbed for assessing the security of a MANET, by allowing to perform the described attacks. The obtained results have shown that, in some cases, the purely theoretically described attacks presented in the literature, are in fact not realisable because of some “real world” operation details left unconsidered in the original paper.

[1]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Ajit Singh,et al.  A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .

[3]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[4]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[5]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[6]  Peter C. Mason,et al.  Providing Effective Security in Mobile Ad Hoc Networks Without Affecting Bandwidth or Interoperability , 2008 .

[7]  Wenke Lee,et al.  An Extensible Environment for Evaluating Secure MANET , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[8]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .

[9]  Irshad Ullah,et al.  Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .

[10]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[11]  Pramod Kumar Soni,et al.  A Survey of Mobile Ad Hoc Network Attacks , 2013 .

[12]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[13]  Steven Furnell,et al.  Attacks against mobile ad hoc networks routing protocol , 2004 .

[14]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[15]  Tobias Bucher,et al.  Modelling and Analysis of Attacks on the MANET Routing in AODV , 2006, ADHOC-NOW.

[16]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[17]  M. Mohana Priya A NOVEL TECHNIQUE FOR DEFENDING ROUTING ATTACKS IN OLSR MANET , 2010 .