CFP last date
20 May 2024
Reseach Article

Vulnerabilities, Attacks and their Detection Techniques in Ad hoc Network

Published on Decmber 2011 by Rauki Yadav, Naveen Hemrajani
International Conference on Computer Communication and Networks CSI-COMNET-2011
Foundation of Computer Science USA
COMNET - Number 1
Decmber 2011
Authors: Rauki Yadav, Naveen Hemrajani
d50c6e57-6a01-472b-90b1-eac93d195395

Rauki Yadav, Naveen Hemrajani . Vulnerabilities, Attacks and their Detection Techniques in Ad hoc Network. International Conference on Computer Communication and Networks CSI-COMNET-2011. COMNET, 1 (Decmber 2011), 46-51.

@article{
author = { Rauki Yadav, Naveen Hemrajani },
title = { Vulnerabilities, Attacks and their Detection Techniques in Ad hoc Network },
journal = { International Conference on Computer Communication and Networks CSI-COMNET-2011 },
issue_date = { Decmber 2011 },
volume = { COMNET },
number = { 1 },
month = { Decmber },
year = { 2011 },
issn = 0975-8887,
pages = { 46-51 },
numpages = 6,
url = { /proceedings/comnet/number1/5421-1009/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Computer Communication and Networks CSI-COMNET-2011
%A Rauki Yadav
%A Naveen Hemrajani
%T Vulnerabilities, Attacks and their Detection Techniques in Ad hoc Network
%J International Conference on Computer Communication and Networks CSI-COMNET-2011
%@ 0975-8887
%V COMNET
%N 1
%P 46-51
%D 2011
%I International Journal of Computer Applications
Abstract

The aim of this Paper is to study the performance of the OLSR protocol. This paper is about security issues in OLSR. There are many ways a malicious node can exploit the vulnerabilities to launch attack on network. OLSR is a proactive routing protocol, Control packets has been send by OLSR to build and update the topology. As a part of this paper I have simulated a new attack method against OLSR based ad-hoc networks named as detour attack. Initially the attack is simulated with one attacker then with multiple attacks and the overall performance of network is observed under attack as well as normal conditions .The observations are made with different set of topologies and for different positions of attacking nodes. Finally a detection technique is proposed to detect the presence of an attacker node carrying out Detour attack

References
  1. http://www.nsnam.org/, 2011.
  2. I. Aad, J.-P. Hubaux, and E.W. Knightly. Impact of denial of service attacks on ad hoc networks. Networking, IEEE/ACM Transactions on, 16(4):791 –802, aug. 2008.
  3. M.S. Corson and J.P. Macker. Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations, 1998.
  4. S. Deering and R. Hinden. Rfc2460 - internet protocol, version 6 (ipv6) specification, standards track edition, 1998.
  5. Paul Muhlethaler Adjih Cedric, Daniele Raffo. Attack against olsr: Distributed key management for security.
  6. V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of service attacks at the mac layer in wireless ad hoc networks. In MILCOM 2002. Proceedings,volume 2, pages 1118 – 1123 vol.2.
  7. M. Wang, L. Lamont, P. Mason, and M. Gorlatova. An effective intrusion detection approach for olsr manet protocol. In Secure Network Protocols, 2005. (NPSec). 1st IEEE ICNP Workshop on, pages 55 – 60, nov. 2005.
  8. P. Jacquet and T. Clausen. Optimized link state routing protocol (olsr), rfc 3626, 2003.
  9. John S. Baras, Svetlana Radosavac, George Theodorakopoulos, Dan Sterne, Peter Budulas, and Richard Gopaul. Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in olsr. In Military Communications Conference, 2007. MILCOM 2007. IEEE, pages 1 –7, oct. 2007.
  10. Thomas Clausen and Ulrich Herberg. Vulnerability analysis of the optimized link state routing protocol version 2 (olsrv2). In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on, pages 628 –633, june 2010.
  11. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized link state routing protocol for ad hoc networks. In MultiTopic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings. IEEE International, pages 62 – 68, 2001.
  12. W.W. Brown, IV Marano, V., W.H. MacCorkell, and T. Krout. Future combat system-scalable mobile network demonstration performance and validation results. In Military Communications Conference, 2003. MILCOM 2003.IEEE, volume 2, pages 1286 – 1291 Vol.2, oct. 2003.
  13. F. Templin, R. Ogier, and M. Lewis. tbrpf rfc3684, experimental edition,February 2004.
  14. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer. A secure routing protocol for ad hoc networks. In Network Protocols, 2002.Proceedings. 10th IEEE International Conference on, pages 78 – 87, nov.2002.
  15. University of Southern California Information Sciences Institute. Rfc791 internet protocol, 1981.
  16. Hoang Lan Nguyen and Uyen Trang Nguyen. Study of different types of attacks on multicast in mobile ad hoc networks. In Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on, page 149, april 2006.
  17. Ruiliang Chen, M. Snow, Jung-Min Park, M.T. Refaei, and M. Eltoweissy Nis02-3: Defense against routing disruption attacks in mobile ad hoc networks. In Global Telecommunications Conference, 2006. GLOBECOM ’06.IEEE, pages 1 –5, 27 2006-dec. 1 2006.
  18. Da Zhang and Chai Kiat Yeo. A novel architecture of intrusion detection system. In Consumer Communications and Networking Conference (CCNC),2010 7th IEEE, pages 1 –5, jan. 2010.
  19. J. Orset and A. Cavalli. A security model for olsr manet protocol. In Mobile Data Management, 2006. MDM 2006. 7th International Conference on, page 122, may 2006.
  20. B. Kannhavong, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour. Analysis of the node isolation attack against olsr-based mobile ad hoc networks. In Computer Networks, 2006 International Symposium on, pages 30–35.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless networks Routing Protocol Ad hoc network multi point relay Security Attacks