1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

Research Article

On the Survivability of Routing Protocols in Ad Hoc Wireless Networks

  • @INPROCEEDINGS{10.1109/SECURECOMM.2005.30,
        author={B.  Awerbuch and  R. Curtmola and  D.  Holmer and H. Rubens and C. Nita-Rotaru},
        title={On the Survivability of Routing Protocols in Ad Hoc Wireless Networks},
        proceedings={1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2006},
        month={3},
        keywords={},
        doi={10.1109/SECURECOMM.2005.30}
    }
    
  • B. Awerbuch
    R. Curtmola
    D. Holmer
    H. Rubens
    C. Nita-Rotaru
    Year: 2006
    On the Survivability of Routing Protocols in Ad Hoc Wireless Networks
    SECURECOMM
    IEEE
    DOI: 10.1109/SECURECOMM.2005.30
B. Awerbuch1, R. Curtmola1, D. Holmer1, H. Rubens1, C. Nita-Rotaru1
  • 1: Johns Hopkins University

Abstract

Survivable routing protocols are able to provide service in the presence of attacks and failures. The strongest attacks that protocols can experience are attacks where adversaries have full control of a number of authenticated nodes that behave arbitrarily to disrupt the network, also referred to as Byzantine attacks. This work examines the survivability of ad hoc wireless routing protocols in the presence of several Byzantine attacks: black holes, flood rushing, wormholes and overlay network wormholes. Traditional secure routing protocols that assume authenticated nodes can always be trusted, fail to defend against such attacks. Our protocol, ODSBR, is an on-demand wireless routing protocol able to provide correct service in the presence of failures and Byzantine attacks. We demonstrate through simulation its effectiveness in mitigating such attacks. Our analysis of the impact of these attacks versus the adversary’s effort gives insights into their relative strengths, their interaction and their importance when designing wireless routing protocols.