Security analysis of TORA routing protocol
In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages...
| Main Authors: | , |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/3195/ |
| _version_ | 1848790260377452544 |
|---|---|
| author | Chee, Vee Liem Yau, Wei Chuen |
| author_facet | Chee, Vee Liem Yau, Wei Chuen |
| author_sort | Chee, Vee Liem |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages. The analysis shows that three misuse actions on the routing messages, including drop, modify and forward, and active forge, enable the malicious attacker to conduct real time attacks on TORA protocol. We demonstrate the attacks using NS-2 software and then analyze the simulation results. The simulation results verify our analysis and we observe that through certain misuses, an inside attacker can degrade the network performance, disrupting the route creation process and consume scarce network resource. |
| first_indexed | 2025-11-14T18:09:47Z |
| format | Conference or Workshop Item |
| id | mmu-3195 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:09:47Z |
| publishDate | 2007 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-31952011-10-06T08:46:25Z http://shdl.mmu.edu.my/3195/ Security analysis of TORA routing protocol Chee, Vee Liem Yau, Wei Chuen T Technology (General) QA75.5-76.95 Electronic computers. Computer science In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages. The analysis shows that three misuse actions on the routing messages, including drop, modify and forward, and active forge, enable the malicious attacker to conduct real time attacks on TORA protocol. We demonstrate the attacks using NS-2 software and then analyze the simulation results. The simulation results verify our analysis and we observe that through certain misuses, an inside attacker can degrade the network performance, disrupting the route creation process and consume scarce network resource. 2007-08 Conference or Workshop Item NonPeerReviewed Chee, Vee Liem and Yau, Wei Chuen (2007) Security analysis of TORA routing protocol. In: International Conference on Computational Science and Its Applications (ICCSA 2007), 26-29 AUG 2007, Kuala Lumpur, MALAYSIA. http://apps.webofknowledge.com/full_record.do?product=WOS&search_mode=GeneralSearch&qid=1&SID=S1iePfOnkoH@G2@8I1N&page=122&doc=1211 |
| spellingShingle | T Technology (General) QA75.5-76.95 Electronic computers. Computer science Chee, Vee Liem Yau, Wei Chuen Security analysis of TORA routing protocol |
| title | Security analysis of TORA routing protocol |
| title_full | Security analysis of TORA routing protocol |
| title_fullStr | Security analysis of TORA routing protocol |
| title_full_unstemmed | Security analysis of TORA routing protocol |
| title_short | Security analysis of TORA routing protocol |
| title_sort | security analysis of tora routing protocol |
| topic | T Technology (General) QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/3195/ http://shdl.mmu.edu.my/3195/ |