Security analysis of TORA routing protocol

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages. The analysis shows that three misuse actions on the routing messages, including drop, modify and forward, and active forge, enable the malicious attacker to conduct real time attacks on TORA protocol. We demonstrate the attacks using NS-2 software and then analyze the simulation results. The simulation results verify our analysis and we observe that through certain misuses, an inside attacker can degrade the network performance, disrupting the route creation process and consume scarce network resource. © Springer-Verlag Berlin Heidelberg 2007.

Author supplied keywords

Cite

CITATION STYLE

APA

Chee, V. L., & Yau, W. C. (2007). Security analysis of TORA routing protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4706 LNCS, pp. 975–986). Springer Verlag. https://doi.org/10.1007/978-3-540-74477-1_87

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free