Security Vulnerabilities in Ad Hoc Networks

Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present different security vulnerabilities and this paper provides a detailed classification of these threats. Threats exist to a mobile ad hoc network both from external nodes unauthorised to participate in the mobile ad hoc networks, and from internal nodes, which have the authorisation credentials to participate in the mobile ad hoc network. Internal nodes giving rise to threats can be further divided according to their behaviour — failed, badly failed, selfish and malicious nodes. Failed and selfish nodes are those which do not perform certain operations that the protocol specifies that they should, the former due to some unforeseen failure and the latter due to selfishness to conserve power. Badly failed nodes may perform operations incorrectly, introducing false and misleading information into the network. Malicious nodes may deliberately disrupt the network using a variety of attacks. All categories of node behaviour should be considered when designing protocols for mobile ad hoc networks.

[1]  Thomas Clausen,et al.  The Optimized Link State Routing Protocol: Evaluation through Experiments and Simulation , 2001 .

[2]  Wayne E. Stark,et al.  Frequency-hopped spread spectrum in the presence of a follower partial-band jammer , 1993, IEEE Trans. Commun..

[3]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[4]  Xiaoyan Hong,et al.  LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[5]  Yu-Chee Tseng,et al.  Location Awareness in Ad Hoc Wireless Mobile Networks , 2001, Computer.

[6]  H Deng,et al.  ROUTING SECURITY IN AD HOC NETWORKS , 2002 .

[7]  Xiaoyan Hong,et al.  LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 1988, MobiHoc.

[8]  Richard G. Ogier,et al.  A reliable, efficient topology broadcast protocol for dynamic networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[9]  Janne Lundberg Routing Security in Ad Hoc Networks , 2000 .

[10]  Charles E. Perkins,et al.  The Ad Hoc on-demand distance-vector protocol , 2001 .

[11]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[12]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[13]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[14]  Zygmunt J. Haas,et al.  ZRP: a hybrid framework for routing in Ad Hoc networks , 2001 .

[15]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[16]  Zygmunt J. Haas,et al.  The performance of query control schemes for the zone routing protocol , 1998, SIGCOMM '98.

[17]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[18]  Mario Gerla,et al.  Fisheye state routing: a routing scheme for ad hoc wireless networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.