TY - GEN
T1 - An attacker model for MANET routing security
AU - Cordasco, Jared
AU - Wetzel, Susanne
PY - 2009
Y1 - 2009
N2 - Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a sophisticated routing protocol. Early proposed routing protocols were not designed to operate in the presence of attackers. There have been many subsequent attempts to secure these protocols, each with its own advantages and disadvantages. To allow for a comparison of these secure protocols, a single common attacker model is needed. Our first contribution in this work is to develop a comprehensive attacker model categorizing attackers based on their capabilities. This is in contrast to the existing models which seek to categorize attacks and then map that categorization back onto the attackers. Our second contribution is an analysis of the SAODV routing protocol using our new model, which demonstrates the structured approach inherent in our model and its benefits compared to existing work.
AB - Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a sophisticated routing protocol. Early proposed routing protocols were not designed to operate in the presence of attackers. There have been many subsequent attempts to secure these protocols, each with its own advantages and disadvantages. To allow for a comparison of these secure protocols, a single common attacker model is needed. Our first contribution in this work is to develop a comprehensive attacker model categorizing attackers based on their capabilities. This is in contrast to the existing models which seek to categorize attacks and then map that categorization back onto the attackers. Our second contribution is an analysis of the SAODV routing protocol using our new model, which demonstrates the structured approach inherent in our model and its benefits compared to existing work.
KW - Ad-hoc
KW - Attacker model
KW - MANET
KW - Routing
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=70349159969&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349159969&partnerID=8YFLogxK
U2 - 10.1145/1514274.1514288
DO - 10.1145/1514274.1514288
M3 - Conference contribution
AN - SCOPUS:70349159969
SN - 9781605584607
T3 - Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
SP - 87
EP - 93
BT - Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
T2 - 2nd ACM Conference on Wireless Network Security, WiSec'09
Y2 - 16 March 2009 through 18 March 2009
ER -