An attacker model for MANET routing security

Jared Cordasco, Susanne Wetzel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a sophisticated routing protocol. Early proposed routing protocols were not designed to operate in the presence of attackers. There have been many subsequent attempts to secure these protocols, each with its own advantages and disadvantages. To allow for a comparison of these secure protocols, a single common attacker model is needed. Our first contribution in this work is to develop a comprehensive attacker model categorizing attackers based on their capabilities. This is in contrast to the existing models which seek to categorize attacks and then map that categorization back onto the attackers. Our second contribution is an analysis of the SAODV routing protocol using our new model, which demonstrates the structured approach inherent in our model and its benefits compared to existing work.

Original languageEnglish
Title of host publicationProceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
Pages87-93
Number of pages7
DOIs
StatePublished - 2009
Event2nd ACM Conference on Wireless Network Security, WiSec'09 - Zurich, Switzerland
Duration: 16 Mar 200918 Mar 2009

Publication series

NameProceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09

Conference

Conference2nd ACM Conference on Wireless Network Security, WiSec'09
Country/TerritorySwitzerland
CityZurich
Period16/03/0918/03/09

Keywords

  • Ad-hoc
  • Attacker model
  • MANET
  • Routing
  • Security

Fingerprint

Dive into the research topics of 'An attacker model for MANET routing security'. Together they form a unique fingerprint.

Cite this