Skip to main content

Broken Link Fraud in DSDV Routing - Detection and Countermeasure

  • Conference paper
  • 1755 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 190))

Abstract

Routing protocols employed in Mobile Ad Hoc Networks (MANET) lack security mechanisms. Vulnerabilities in protocols are exploited by malicious/compromised nodes to launch attacks.Consequently network performance is degraded. ‘Broken Link Fraud’is a Denial of Service (DoS) attack launched against Destination Sequence Distance Vector (DSDV) Protocol. Malicious node announces a ‘broken link’to victim node. Honest nodes in the network are fooled into believing that route to victim does not exist. Network performance in terms of Packet Delivery Ratio (PDR) is severely affected. In this paper, we propose a countermeasure for the attack. Our method has an advantage that it does not rely on cryptographic techniques. It is suitable for resource constrained MANETs. Simulation results confirm the effectiveness of our technique in improving PDR.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Network simulator 3, http://www.nsnam.org

  2. Awerbuch, B., Curtmola, R., Holmer, D., Rotaru, C.N., Rubens, H.: Mitigating Byzantine Attacks in Ad Hoc Wireless Networks. Technical report, Department of Computer Science. Johns Hopkins University, Tech. (2004)

    Google Scholar 

  3. Bellman, R.: On a Routing Problem. Quarterly of Applied Mathematics 16(1), 87–90 (1958)

    MathSciNet  MATH  Google Scholar 

  4. Hedrick, C.: Routing Information Protocol. RFC 1058. Technical report, IETF (June 1988)

    Google Scholar 

  5. Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD:Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp. 3–13 (2002)

    Google Scholar 

  6. Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. SIGCOMM Comput. Commun. Rev. 24(4), 234–244 (1994)

    Article  Google Scholar 

  7. Kaur, R., Gaur, M.S., Laxmi, V.: A Novel Attack Model Simulation in DSDV Routing. In: Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security, IEEE Xplore (2011)

    Google Scholar 

  8. Kumar, B.: Integration of Security in Network Routing Protocols. SIGSAC Rev. 11(2), 18–25 (1993)

    Article  Google Scholar 

  9. Smith, B.R., Murthy, S., Garcia-Luna Aceves, J.J.: Securing Distance-Vector Routing Protocols. In: SNDSS 1997: Proceedings of the 1997 Symposium on Network and Distributed System Security, p. 85. IEEE Computer Society, Washington, DC, USA (1997)

    Chapter  Google Scholar 

  10. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting black-hole attack in mobile ad hoc networks. In: 5th European Personal Mobile Communications Conference (Conf. Publ. No. 492), pp. 490–495 (2003)

    Google Scholar 

  11. Wan, T., An, H.-C., van Oorschot, P.C.: Securing the destination-sequenced distance vector routing protocol (S-DSDV). In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 358–374. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Weichao, W., Lu, Y., Bhargava, B.: On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks. In: Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pp. 179–186 (2003)

    Google Scholar 

  13. Wu, B., Chen, J., Wu, J., Cardei, M.: A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless Network Security, Signals and Communication Technology, Part II. Springer, Heidelberg (2007)

    Google Scholar 

  14. Kaur, R., Gaur, M.S., Suresh, L., Laxmi, V.: DOS Attacks in MANETs. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, pp. 124–145 (2011), doi: 10.4018/978-1-60960-123-2

    Google Scholar 

  15. Gorantala, K.: Routing Protocols in Mobile Ad-hoc Networks. Master Thesis in Computer Science, Dept. of Comp.Sci., Umea Univ., Swedan (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sharma, H.M., Kaur, R., Gaur, M.S., Laxmi, V. (2011). Broken Link Fraud in DSDV Routing - Detection and Countermeasure. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22709-7_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22708-0

  • Online ISBN: 978-3-642-22709-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics