Vulnerability analysis of the simple multicast forwarding (SMF) protocol for mobile ad hoc networks

Jiazi Yi, Thomas Clausen, Ulrich Herberg

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

If deployments of Mobile Ad Hoc Networks (MANETs) are to become common outside of purely experimental settings, protocols operating such MANETs must be able to preserve network integrity, even when faced with careless or malicious participants. A first step towards protecting a MANET is to analyze the vulnerabilities of the routing protocol(s), managing the connectivity. Understanding how these routing protocols can be exploited by those with ill intent, countermeasures can be developed, readying MANETs for wider deployment and use. One routing protocol for MANETs, developed by the Internet Engineering Task Force (IETF) as a multicast routing protocol for efficient data dissemination, is denoted "Simplified Multicast Forwarding" (SMF). This protocol is analyzed, and its vulnerabilities described, in this paper. SMF consists of two independent components: (i) duplicate packet detection and (ii) relay set selection, each of which presents its own set of vulnerabilities that an attacker may exploit to compromise network integrity. This paper explores vulnerabilities in each of these, with the aim of identifying attack vectors and thus enabling development of countermeasures.

Original languageEnglish
Title of host publicationProceedings - 2011 IEEE International Conferences on Internet of Things and Cyber, Physical and Social Computing, iThings/CPSCom 2011
Pages364-371
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2011
Event2011 IEEE International Conference on Internet of Things, iThings 2011 and 4th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2011 - Dalian, China
Duration: 19 Oct 201122 Oct 2011

Publication series

NameProceedings - 2011 IEEE International Conferences on Internet of Things and Cyber, Physical and Social Computing, iThings/CPSCom 2011

Conference

Conference2011 IEEE International Conference on Internet of Things, iThings 2011 and 4th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2011
Country/TerritoryChina
CityDalian
Period19/10/1122/10/11

Fingerprint

Dive into the research topics of 'Vulnerability analysis of the simple multicast forwarding (SMF) protocol for mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this