TY - GEN
T1 - Vulnerability analysis of relay set selection algorithms for the Simplified Multicast Forwarding (SMF) protocol for mobile ad hoc networks
AU - Yi, Jiazi
AU - Clausen, Thomas
PY - 2012/12/14
Y1 - 2012/12/14
N2 - After more than a decade of research and standardization, Mobile Ad Hoc NETworks (MANET) are finding their place in real-world deployments, such as in community, tactical and vehicular networks. Becoming so present in "the real world" also means that MANETs, and the protocols operating them, are affronted with a more hostile environment, where misconfiguration, eavesdropping, and attacks must be addressed. A first step in addressing MANET security is understanding the vulnerabilities of MANET protocols, and how an attacker can exploit these. This papert studies the Relay Set Selection (RSS) algorithms that are commonly used in multicast routing protocol for MANETs, and which are undergoing standardization as part of the Simplified Multicast Forwarding (SMF) protocol, developed within the Internet Engineering Task Force (IETF). Attack vectors for these different RSS algorithms are described, with the purpose of enabling future development of security solutions.
AB - After more than a decade of research and standardization, Mobile Ad Hoc NETworks (MANET) are finding their place in real-world deployments, such as in community, tactical and vehicular networks. Becoming so present in "the real world" also means that MANETs, and the protocols operating them, are affronted with a more hostile environment, where misconfiguration, eavesdropping, and attacks must be addressed. A first step in addressing MANET security is understanding the vulnerabilities of MANET protocols, and how an attacker can exploit these. This papert studies the Relay Set Selection (RSS) algorithms that are commonly used in multicast routing protocol for MANETs, and which are undergoing standardization as part of the Simplified Multicast Forwarding (SMF) protocol, developed within the Internet Engineering Task Force (IETF). Attack vectors for these different RSS algorithms are described, with the purpose of enabling future development of security solutions.
U2 - 10.1109/NBiS.2012.48
DO - 10.1109/NBiS.2012.48
M3 - Conference contribution
AN - SCOPUS:84870841526
SN - 9780769547794
T3 - Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012
SP - 255
EP - 260
BT - Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012
T2 - 2012 15th International Conference on Network-Based Information Systems, NBIS 2012
Y2 - 26 September 2012 through 28 September 2012
ER -