Ad Hoc Networks. 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings

Research Article

A New Look at an Old Attack: ARP Spoofing to Create Routing Loops in Ad Hoc Networks

Download
372 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-74439-1_5,
        author={J. Brown and Tricia Willink},
        title={A New Look at an Old Attack: ARP Spoofing to Create Routing Loops in Ad Hoc Networks},
        proceedings={Ad Hoc Networks. 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28--29, 2017, Proceedings},
        proceedings_a={ADHOCNETS},
        year={2018},
        month={2},
        keywords={Denial of service ARP spoofing Ad hoc networks 
    Sensor networks Routing loops Resource consumption DoS defences},
        doi={10.1007/978-3-319-74439-1_5}
    }
    
  • J. Brown
    Tricia Willink
    Year: 2018
    A New Look at an Old Attack: ARP Spoofing to Create Routing Loops in Ad Hoc Networks
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-319-74439-1_5
J. Brown1,*, Tricia Willink1,*
  • 1: Defence R&D Canada
*Contact email: david.brown@drdc-rddc.gc.ca, tricia.willink@drdc-rddc.gc.ca

Abstract

This paper examines a new application of the well-known ARP spoofing (or ARP cache poisoning) attack. Traditionally, ARP spoofing has been applied in local area networks to allow an attacker to achieve a man-in-the-middle position against target hosts, or to implement a denial of service by routing messages to non-existent hardware addresses. In this paper, we introduce a variant of ARP spoofing in which a routing loop is created in a target wireless ad hoc network. The routing loop not only results in a denial of service against the targeted hosts, but creates a resource consumption attack, where the targets waste power and occupy the channel, precluding its use by legitimate traffic. We show experimental results of an implementation and provide suggestions as to how to prevent, detect, or mitigate the attack.