Security analysis of TORA routing protocol

In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages...

Full description

Bibliographic Details
Main Authors: Chee, Vee Liem, Yau, Wei Chuen
Format: Conference or Workshop Item
Published: 2007
Subjects:
Online Access:http://shdl.mmu.edu.my/3195/
_version_ 1848790260377452544
author Chee, Vee Liem
Yau, Wei Chuen
author_facet Chee, Vee Liem
Yau, Wei Chuen
author_sort Chee, Vee Liem
building MMU Institutional Repository
collection Online Access
description In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages. The analysis shows that three misuse actions on the routing messages, including drop, modify and forward, and active forge, enable the malicious attacker to conduct real time attacks on TORA protocol. We demonstrate the attacks using NS-2 software and then analyze the simulation results. The simulation results verify our analysis and we observe that through certain misuses, an inside attacker can degrade the network performance, disrupting the route creation process and consume scarce network resource.
first_indexed 2025-11-14T18:09:47Z
format Conference or Workshop Item
id mmu-3195
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:09:47Z
publishDate 2007
recordtype eprints
repository_type Digital Repository
spelling mmu-31952011-10-06T08:46:25Z http://shdl.mmu.edu.my/3195/ Security analysis of TORA routing protocol Chee, Vee Liem Yau, Wei Chuen T Technology (General) QA75.5-76.95 Electronic computers. Computer science In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages. The analysis shows that three misuse actions on the routing messages, including drop, modify and forward, and active forge, enable the malicious attacker to conduct real time attacks on TORA protocol. We demonstrate the attacks using NS-2 software and then analyze the simulation results. The simulation results verify our analysis and we observe that through certain misuses, an inside attacker can degrade the network performance, disrupting the route creation process and consume scarce network resource. 2007-08 Conference or Workshop Item NonPeerReviewed Chee, Vee Liem and Yau, Wei Chuen (2007) Security analysis of TORA routing protocol. In: International Conference on Computational Science and Its Applications (ICCSA 2007), 26-29 AUG 2007, Kuala Lumpur, MALAYSIA. http://apps.webofknowledge.com/full_record.do?product=WOS&search_mode=GeneralSearch&qid=1&SID=S1iePfOnkoH@G2@8I1N&page=122&doc=1211
spellingShingle T Technology (General)
QA75.5-76.95 Electronic computers. Computer science
Chee, Vee Liem
Yau, Wei Chuen
Security analysis of TORA routing protocol
title Security analysis of TORA routing protocol
title_full Security analysis of TORA routing protocol
title_fullStr Security analysis of TORA routing protocol
title_full_unstemmed Security analysis of TORA routing protocol
title_short Security analysis of TORA routing protocol
title_sort security analysis of tora routing protocol
topic T Technology (General)
QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/3195/
http://shdl.mmu.edu.my/3195/