19.4. Security of Ad-Hoc NetworksBecause of dynamic topological changes, ad-hoc networks are vulnerable at the physical link, as they can easily be manipulated. An intruder can easily attack ad-hoc networks by loading available network resources, such as wireless links and energy (battery) levels of other users, and then disturb all users. Attackers can also disturb the normal operation of routing protocols by modifying packets. The intruder may insert spurious information into routing packets, causing erroneous routing table updates and thus misrouting. Some other security vulnerabilities of ad-hoc networks follow.
In any network, routing information can give an attacker access to relationships among nodes and their IP addresses. Especially in ad-hoc networks, an attacker may be able to bring the network down. 19.4.1. Types of AttacksAttacks in ad-hoc networks are either passive or active . In a passive attack, the normal operation of a routing protocol is not interrupted . Instead, an intruder tries to gather information by listening. Active attacks can sometimes be detectable and thus are less important. In an active attack, an attacker can insert some arbitrary packets of information into the network to disable it or to attract packets destined to other nodes. Pin AttackWith the pin , or black-hole , attack , a malicious node pretends to have the shortest path to the destination of a packet. Normally, the intruder listens to a path set-up phase and, when learns of a request for a route, sends a reply advertising a shortest route. Then, the intruder can be an official part of the network if the requesting node receives its malicious reply before the reply from a good node, and a forged route is set up. Once it becomes part of the network, the intruder can do anything within the network, such as undertaking a denial-of-service attack. Location-Disclosure AttackBy learning the locations of intermediate nodes, an intruder can find out the location of a target node. The location-disclosure attack is made by an intruder to obtain information about the physical location of nodes in the network or the topology of the network. Routing Table OverflowSometimes, an intruder can create routes whose destinations do not exist. This type of attack, known as the routing table overflow . overwhelms the usual flow of traffic, as it creates too many dummy active routes. This attack has a profound impact on proactive routing protocols, which discover routing information before it is needed, but minimal impact on reactive routing protocols , which create a route only when needed. Energy-Exhaustion AttackBattery- powered nodes can conserve their power by transmitting only when needed. But an intruder may try to forward unwanted packets or request repeatedly fake or unwanted destinations to use up the energy of nodes' batteries. 19.4.2. Criteria for a Secure Routing ProtocolIn order to prevent ad-hoc networks from attacks and vulnerability, a routing protocol must possess the following properties:
|