Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols

Yih Chun Hu, Adrian Perrig, David B. Johnson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types of routing based on periodic (proactive) mechanisms. Significant attention recently has been devoted to developing secure routing protocols for ad hoc networks, including a number of secure on-demand routing protocols, that defend against a variety of possible attacks on network routing. In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad hoc network routing protocols. For example, DSR, AODV, and secure protocols based on them, such as Ariadne, ARAN, and SAODV, are unable to discover routes longer than two hops when subject to this attack. This attack is also particularly damaging because it can be performed by a relatively weak attacker. We analyze why previous protocols fail under this attack. We then develop Rushing Attack Prevention (RAP), a generic defense against the rushing attack for on-demand protocols. RAP incurs no cost unless the underlying protocol fails to find a working route, and it provides provable security properties even against the strongest rushing attackers.

Original languageEnglish (US)
Title of host publicationProceedings of the Workshop on Wireless Security
PublisherAssociation for Computing Machinery
Pages30-40
Number of pages11
ISBN (Print)1581137699, 9781581137699
DOIs
StatePublished - 2003
Externally publishedYes
EventProceedings of the 2003 ACM Workshop on Wireless Security - San Diego, CA, United States
Duration: Sep 19 2003Sep 19 2003

Publication series

NameProceedings of the Workshop on Wireless Security

Other

OtherProceedings of the 2003 ACM Workshop on Wireless Security
Country/TerritoryUnited States
CitySan Diego, CA
Period9/19/039/19/03

Keywords

  • Ad hoc network routing
  • Routing
  • Rushing
  • Security

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols'. Together they form a unique fingerprint.

Cite this