13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Prevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Networks 143the overhead caused <strong>by</strong> flood<strong>in</strong>g the whole network. The packets are flooded <strong>in</strong>a small area (a r<strong>in</strong>g) first def<strong>in</strong>ed <strong>by</strong> a start<strong>in</strong>g TTL (time-to-live) <strong>in</strong> the IPheaders. After RING TRAVERSAL TIME, if no RREP has been received, theflooded area is enlarged <strong>by</strong> <strong>in</strong>creas<strong>in</strong>g the TTL <strong>by</strong> a fixed value. The procedureis repeated until an RREP is received <strong>by</strong> the orig<strong>in</strong>ator of the RREQ, i.e., theroute has been found [2].Nodes <strong>in</strong> the network avoid their packets from be<strong>in</strong>g replayed <strong>by</strong> <strong>in</strong>crement<strong>in</strong>ga sequence number and RREQ ID for each new packet. From the description<strong>in</strong> the last paragraph, we can observe that the RREQ’s only exist with<strong>in</strong> anarea. The nodes outside the area will never know the freshest sequence numbersand RREQ ID’s. It is trivial to simply record the RREQ of one node and thenbroadcast it <strong>in</strong> another area of the network. If the area where the packets arebroadcast to has up-to-date <strong>in</strong>formation, the packets will be simply discarded.If the <strong>in</strong>formation is out-of-date, the packets will provoke extra unnecessaryrounds of route discoveries. By perform<strong>in</strong>g this attack massively, a denial ofservice attack can be launched.This attack is illustrated <strong>in</strong> Fig.1. At time t0, attacker M overhears the RREQfrom A. At time t1, M replays the RREQ to B. Because B has not heard thefreshest RREQ, it will start process<strong>in</strong>g the RREQ so an unnecessary round ofroute discovery is launched <strong>in</strong> the area.Fig. 1. RREQ Flood<strong>in</strong>g AttackWormhole Attack. Wormhole attack has been described <strong>in</strong> [16]. Here weoutl<strong>in</strong>e it just for a review. In this k<strong>in</strong>d of replay attack, a tunnel is formedbetween two nodes through which attackers can transmit packets <strong>in</strong> a speedfaster than the normal hop-<strong>by</strong>-hop propagation through legitimate wireless l<strong>in</strong>ks<strong>by</strong> us<strong>in</strong>g long range directional wireless l<strong>in</strong>ks or even wired l<strong>in</strong>ks.Figure 2 illustrates this attack. Node A wants to f<strong>in</strong>d out a route to nodeB. It broadcasts an RREQ which first reaches X and M1 (an attacker-could betransparent to the network). While X relays RREQ to its neighbors W and Y,M1 tunnels this request to M2 (another attacker) us<strong>in</strong>g a fast l<strong>in</strong>k. M2 broadcaststhis RREQ to Z, which <strong>in</strong> turn relays it to B. S<strong>in</strong>ce this is faster than thevalid route, the valid RREQ is suppressed, and this route is shorter, the maliciousroute A-M1-M2-Z-B is selected. Furthermore, if nodes near A are about to

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!