Adversarial testing of wireless routing implementations

Md Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles E. Killian, Cristina Nita-Rotaru

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

We focus on automated adversarial testing of real-world implementations of wireless routing protocols. We extend an existing platform, Turret, designed for general distributed systems, to address the specifics of wireless routing protocols. Specifically, we add functionality to differentiate routing messages from data messages and support wireless specific attacks such as blackhole and wormhole, or routing attacks such as replay attacks. The extended platform, Turret-W, uses a network emulator to create reproducible network conditions and virtualization to run unmodified binaries of wireless protocol implementations. Using the platform on publicly available implementations of two representative routing protocols we (re-)discovered 14 attacks and 3 bugs.

Original languageEnglish (US)
Title of host publicationWiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks
Pages143-148
Number of pages6
DOIs
StatePublished - 2013
Externally publishedYes
Event6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013 - Budapest, Hungary
Duration: Apr 17 2013Apr 19 2013

Publication series

NameWiSec 2013 - Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks

Conference

Conference6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013
CountryHungary
CityBudapest
Period4/17/134/19/13

Keywords

  • Adversarial testing
  • Routing
  • Virtualization
  • Wireless

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Adversarial testing of wireless routing implementations'. Together they form a unique fingerprint.

Cite this