On Vulnerability and Protection of AODV
Tech report number
CERIAS TR 2002-24
Abstract
AODV (Ad Hoc On-Demand Distance Vector) is one of the hottest routing protocols under research for Ad Hoc networks. In this technical report, we study both the strong points and vulnerabilities of AODV under internal attacks from security perspective. On the strong points, we focus on the features of combination of multicast and unicast, fast expiration of reverse route and freshness of routing information. For the vulnerabilities, we take a thorough look at various problems related to spurious RREP (Route REPly) with false distance vector and destination sequence number, malicious RREQ (Route REQuest) flooding and forge Route Error (RERR). The impacts of these vulnerabilities are simulated using NS2 and the results are shown. Among all of the vulnerabilities, the attack to destination sequence is the worst. We design and implement a protocol called Reverse Labeling Restriction Protocol (RLRP) to detect and protect the Ad Hoc network from this attack. The effectiveness of RLRP is analyzed and simulated using NS2. The results show that the protocol could effectively identify the compromised site and impressively increase the performance of the Ad Hoc network with limited overhead. We also examine the robustness of RLRP to other attacks.
Institution
Purdue University
Key alpha
Wireless Routing, Security, Intrusion Detection
Organization
CERIAS and NSF
School
Computer Science Dept.
Publication Date
0000-00-00
Contents
Related Work in Protecting Network Structure and Ad Hoc Network
Attacks to AODV and Simulated Results
Reverse Labeling Restriction Protocol (RLRP)
Robustness of RLRP
Keywords
Wireless Routing, Security, Intrusion Detection
Subject
Provide a solution to attack to destination sequence in AODV protocol. The proposed solution could effciently identify the attacker and kick him out of the system.