Abstract
In this paper, we demonstrate a new class of protocol compliant exploits that initiates at the MAC layer but targets ad hoc on-demand routing mechanisms. A misbehaved node implementing this type of attacks completely follows the specifications of IEEE802.11 standard and the existing on-demand routing protocols. However, it can cause routing shortcut attacks or detour attacks. We detail the exploits against two on-demand routing protocols: AODV and DSR. We evaluate the impact of such attacks on the network performance and propose PSD (Prevention from Shortcut and Detour Attack) to mitigate their impacts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of service resilience in ad hoc networks. In: Proc. of ACM MobiCom (September 2004)
Hu, Y.-C., Perrig, A., Johnson, D.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Proc. ACM WiSe (2003)
Kyasanur, P., Vaidya, N.: Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing (September 2005)
Guang, L., Assi, C.: A self-adaptive detection system for MAC misbehavior in ad hoc networks. In: Proc. of IEEE ICC (June 2006)
Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proc. of CNDS (2002)
Raya, M., Hubaux, J.P., Aad, I.: DOMINO: A system to detect greedy behavior in ieee 802.11 hotspots. In: Proc. of ACM MobiSys (June 2004)
Sadagopan, N., Bai, F., Krishnamachari, B., Helmy, A.: PATHS: analysis of path duration statistics and their impact on reactive manet routing protocols. In: Proc. of ACM MobiHoc (2003)
Zapata, M.: Secure Ad Hoc on-demand distance vector (SAODV) routing. Technical report Internet Draft (2001), http://www.ietf.org/internet-drafts/draft-guerrero-manet-saodv-00.txt
Hu, Y.-C., Perrig, A., Johnson, D.: Ariadne: A secure on-demand routing protocol for adhoc networks. In: Proc. of MobiCom (September 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Guang, L., Assi, C., Benslimane, A. (2006). Interlayer Attacks in Mobile Ad Hoc Networks. In: Cao, J., Stojmenovic, I., Jia, X., Das, S.K. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2006. Lecture Notes in Computer Science, vol 4325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11943952_37
Download citation
DOI: https://doi.org/10.1007/11943952_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49932-9
Online ISBN: 978-3-540-49933-6
eBook Packages: Computer ScienceComputer Science (R0)