Research Article
A New Look at an Old Attack: ARP Spoofing to Create Routing Loops in Ad Hoc Networks
@INPROCEEDINGS{10.1007/978-3-319-74439-1_5, author={J. Brown and Tricia Willink}, title={A New Look at an Old Attack: ARP Spoofing to Create Routing Loops in Ad Hoc Networks}, proceedings={Ad Hoc Networks. 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28--29, 2017, Proceedings}, proceedings_a={ADHOCNETS}, year={2018}, month={2}, keywords={Denial of service ARP spoofing Ad hoc networks Sensor networks Routing loops Resource consumption DoS defences}, doi={10.1007/978-3-319-74439-1_5} }
- J. Brown
Tricia Willink
Year: 2018
A New Look at an Old Attack: ARP Spoofing to Create Routing Loops in Ad Hoc Networks
ADHOCNETS
Springer
DOI: 10.1007/978-3-319-74439-1_5
Abstract
This paper examines a new application of the well-known ARP spoofing (or ARP cache poisoning) attack. Traditionally, ARP spoofing has been applied in local area networks to allow an attacker to achieve a man-in-the-middle position against target hosts, or to implement a denial of service by routing messages to non-existent hardware addresses. In this paper, we introduce a variant of ARP spoofing in which a routing loop is created in a target wireless ad hoc network. The routing loop not only results in a denial of service against the targeted hosts, but creates a resource consumption attack, where the targets waste power and occupy the channel, precluding its use by legitimate traffic. We show experimental results of an implementation and provide suggestions as to how to prevent, detect, or mitigate the attack.