1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117
|
<pre>Internet Engineering Task Force (IETF) J. Yi
Request for Comments: 7186 LIX, Ecole Polytechnique
Category: Informational U. Herberg
ISSN: 2070-1721 Fujitsu Laboratories of America
T. Clausen
LIX, Ecole Polytechnique
April 2014
<span class="h1">Security Threats for the Neighborhood Discovery Protocol (NHDP)</span>
Abstract
This document analyzes common security threats of the Neighborhood
Discovery Protocol (NHDP) and describes their potential impacts on
Mobile Ad Hoc Network (MANET) routing protocols using NHDP. This
document is not intended to propose solutions to the threats
described.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see <a href="./rfc5741#section-2">Section 2 of RFC 5741</a>.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
<a href="http://www.rfc-editor.org/info/rfc7186">http://www.rfc-editor.org/info/rfc7186</a>.
<span class="grey">Yi, et al. Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
Provisions Relating to IETF Documents
(<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
<a href="#section-1">1</a>. Introduction . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-3">3</a>
<a href="#section-2">2</a>. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-4">4</a>
<a href="#section-3">3</a>. NHDP Threat Overview . . . . . . . . . . . . . . . . . . . . <a href="#page-4">4</a>
<a href="#section-4">4</a>. Detailed Threat Description . . . . . . . . . . . . . . . . . <a href="#page-5">5</a>
<a href="#section-4.1">4.1</a>. Jamming . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-5">5</a>
<a href="#section-4.2">4.2</a>. Denial-of-Service Attack . . . . . . . . . . . . . . . . <a href="#page-5">5</a>
<a href="#section-4.3">4.3</a>. Eavesdropping and Traffic Analysis . . . . . . . . . . . <a href="#page-6">6</a>
<a href="#section-4.4">4.4</a>. Incorrect HELLO Message Generation . . . . . . . . . . . <a href="#page-7">7</a>
<a href="#section-4.4.1">4.4.1</a>. Identity Spoofing . . . . . . . . . . . . . . . . . . <a href="#page-7">7</a>
<a href="#section-4.4.2">4.4.2</a>. Link Spoofing . . . . . . . . . . . . . . . . . . . . <a href="#page-8">8</a>
<a href="#section-4.5">4.5</a>. Replay Attack . . . . . . . . . . . . . . . . . . . . . . <a href="#page-9">9</a>
<a href="#section-4.6">4.6</a>. Message Timing Attacks . . . . . . . . . . . . . . . . . <a href="#page-9">9</a>
<a href="#section-4.6.1">4.6.1</a>. Interval Time Attack . . . . . . . . . . . . . . . . <a href="#page-10">10</a>
<a href="#section-4.6.2">4.6.2</a>. Validity Time Attack . . . . . . . . . . . . . . . . <a href="#page-10">10</a>
<a href="#section-4.7">4.7</a>. Indirect Channel Overloading . . . . . . . . . . . . . . <a href="#page-10">10</a>
<a href="#section-4.8">4.8</a>. Attack on Link Quality Update . . . . . . . . . . . . . . <a href="#page-11">11</a>
5. Impact of Inconsistent Information Bases on Protocols using
NHDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-12">12</a>
<a href="#section-5.1">5.1</a>. MPR Calculation . . . . . . . . . . . . . . . . . . . . . <a href="#page-12">12</a>
<a href="#section-5.1.1">5.1.1</a>. Flooding Disruption due to Identity Spoofing . . . . <a href="#page-12">12</a>
<a href="#section-5.1.2">5.1.2</a>. Flooding Disruption due to Link Spoofing . . . . . . <a href="#page-13">13</a>
<a href="#section-5.1.3">5.1.3</a>. Broadcast Storm . . . . . . . . . . . . . . . . . . . <a href="#page-14">14</a>
<a href="#section-5.2">5.2</a>. Routing Loops . . . . . . . . . . . . . . . . . . . . . . <a href="#page-15">15</a>
<a href="#section-5.3">5.3</a>. Invalid or Nonexistent Paths to Destinations . . . . . . <a href="#page-16">16</a>
<a href="#section-5.4">5.4</a>. Data Sinkhole . . . . . . . . . . . . . . . . . . . . . . <a href="#page-16">16</a>
<a href="#section-6">6</a>. Future Work . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-16">16</a>
<a href="#section-7">7</a>. Security Considerations . . . . . . . . . . . . . . . . . . . <a href="#page-17">17</a>
<a href="#section-8">8</a>. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-18">18</a>
<a href="#section-9">9</a>. References . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-18">18</a>
<a href="#section-9.1">9.1</a>. Normative References . . . . . . . . . . . . . . . . . . <a href="#page-18">18</a>
<a href="#section-9.2">9.2</a>. Informative References . . . . . . . . . . . . . . . . . <a href="#page-18">18</a>
<span class="grey">Yi, et al. Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
The Neighborhood Discovery Protocol (NHDP) [<a href="./rfc6130" title=""Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)"">RFC6130</a>] allows routers
to acquire topological information up to two hops away from
themselves, by way of periodic HELLO message exchanges. The
information acquired by NHDP is used by other protocols, such as the
Optimized Link State Routing Protocol version 2 (OLSRv2) [<a href="./rfc7181" title=""The Optimized Link State Routing Protocol Version 2"">RFC7181</a>]
and Simplified Multicast Forwarding (SMF) [<a href="./rfc6621" title=""Simplified Multicast Forwarding"">RFC6621</a>]. The topology
information, acquired by way of NHDP, serves these routing protocols
by detecting and maintaining local 1-hop and 2-hop neighborhood
information.
As NHDP is typically used in wireless environments, it is potentially
exposed to different kinds of security threats, some of which are of
particular significance as compared to wired networks. As radio
signals can be received as well as transmitted by any compatible
wireless device within radio range, there is commonly no physical
protection as otherwise known for wired networks. NHDP does not
define any explicit security measures for protecting the integrity of
the information it acquires; however, it suggests that the integrity
protection be addressed in a fashion appropriate to the deployment of
the network.
This document is based on the assumption that no additional security
mechanism such as IPsec is used in the IP layer, as not all MANET
deployments may be able to accommodate such common IP protection
mechanisms (e.g., because of limited resources of MANET routers).
The document analyzes possible attacks on and misconfigurations of
NHDP and outlines the consequences of such attacks/misconfigurations
to the state maintained by NHDP in each router (and, thus, made
available to protocols using this state).
This document is not intended to propose solutions to the threats
described. [<a href="./rfc7185" title=""Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)"">RFC7185</a>] provides further information on how to enable
integrity protection to NHDP, which can help mitigating the threats
described related to identity spoofing.
It should be noted that many NHDP implementations are configurable,
and so an attack on the configuration system (such as [<a href="./rfc6779" title=""Definition of Managed Objects for the Neighborhood Discovery Protocol"">RFC6779</a>]) can
be used to adversely affect the operation of an NHDP implementation.
The NHDP MIB module [<a href="./rfc6779" title=""Definition of Managed Objects for the Neighborhood Discovery Protocol"">RFC6779</a>] might help monitoring some of the
security attacks mentioned in this document. [<a href="#ref-MGMT-SNAP">MGMT-SNAP</a>] provides a
snapshot of OLSRv2-routed MANET management as currently deployed,
while [<a href="#ref-MANET-MGMT">MANET-MGMT</a>] is intended to provide specific guidelines on
MANET network management considering the various MIB modules that
have been written.
<span class="grey">Yi, et al. Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Terminology</span>
This document uses the terminology and notation defined in
"Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format"
[<a href="./rfc5444" title=""Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format"">RFC5444</a>], "Mobile Ad Hoc Network (MANET) Neighborhood Discovery
Protocol (NHDP)" [<a href="./rfc6130" title=""Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)"">RFC6130</a>], and "Internet Security Glossary, Version
2" [<a href="./rfc4949" title=""Internet Security Glossary, Version 2"">RFC4949</a>].
Additionally, this document introduces the following terminology:
NHDP router: A MANET router, running NHDP as specified in [<a href="./rfc6130" title=""Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)"">RFC6130</a>].
Attacker: A device that is present in the network and intentionally
seeks to compromise the information bases in NHDP routers.
Compromised NHDP router: An attacker that is present in the network
and generates syntactically correct NHDP control messages.
Control messages emitted by a compromised NHDP router may contain
additional information, or omit information, as compared to a
control message generated by a non-compromised NHDP router located
in the same topological position in the network.
Legitimate NHDP router: An NHDP router that is not a compromised
NHDP router.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. NHDP Threat Overview</span>
NHDP defines a HELLO messages exchange, enabling each NHDP router to
acquire topological information describing its 1-hop and 2-hop
neighbors, and specifies information bases for recording this
information.
An NHDP router periodically transmits HELLO messages using a link-
local multicast on each of its interfaces with a hop-limit of 1
(i.e., HELLOs are never forwarded). In these HELLO messages, an NHDP
router announces the IP addresses as heard, symmetric, or lost
neighbor interface addresses.
An Attacker has several ways of harming this neighbor discovery
process: it can announce "wrong" information about its identity,
postulate nonexistent links, and replay HELLO messages. These
attacks are presented in detail in <a href="#section-4">Section 4</a>.
The different ways of attacking an NHDP deployment may eventually
lead to inconsistent information bases, not accurately reflecting the
correct topology of the MANET. The consequence is that protocols
using NHDP will base their operation on incorrect information,
causing routing protocols to not be able to calculate correct (or
<span class="grey">Yi, et al. Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
any) paths, degrade the performance of flooding operations based on
reduced relay sets, etc. These consequences to protocols using NHDP
are described in detail in <a href="#section-5">Section 5</a>.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Detailed Threat Description</span>
For each threat, a description of the mechanism of the corresponding
attack is given, followed by a description of how the attack affects
NHDP. The impacts from each attack on protocols using NHDP are given
in <a href="#section-5">Section 5</a>.
For simplicity in the description, the examples given assume that
NHDP routers have a single interface with a single IP address
configured. All the attacks apply, however, for NHDP routers with
multiple interfaces and multiple addresses as well.
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. Jamming</span>
One vulnerability, common for all protocols operating a wireless ad
hoc network, is that of "jamming", i.e., that a device generates
massive amounts of interfering radio transmissions, which will
prevent legitimate traffic (e.g., control traffic as well as data
traffic) on part of a network. Jamming is a form of interference and
overload with the threat consequence of disruption [<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>].
Depending on lower layers, this may not affect transmissions: HELLO
messages from an NHDP router with "jammed" interfaces may be received
by other NHDP routers. As NHDP identifies whether a link to a
neighbor is unidirectional or bidirectional, a routing protocol that
uses NHDP for neighborhood discovery may ignore a link from a jammed
NHDP router to a non-jammed NHDP router. The jammed router (a router
with jammed carrier) would appear simply as "disconnected" for the
unjammed part of the network, which is able to maintain accurate
topology maps.
If a considerable amount of HELLO messages are lost or corrupted due
to collisions caused by a jamming attack, neighbor NHDP routers are
not able to establish links between themselves any more. Thus, NHDP
will present empty information bases to the protocols using it.
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a>. Denial-of-Service Attack</span>
A denial-of-service (DoS) attack can be a result of misconfiguration
of legitimate NHDP routers (e.g., very short HELLO transmission
interval) or malicious behavior of compromised NHDP routers
[<a href="#ref-ACCT2012" title=""DoS Attacks in Mobile Ad Hoc Networks: A Survey"">ACCT2012</a>], so-called Byzantine routers [<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>]. DoS is a form of
interference and overload with the threat consequence of disruption
[<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>].
<span class="grey">Yi, et al. Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
By transmitting a huge amount of HELLO messages in a short period of
time, NHDP routers can increase channel occupation as described in
<a href="#section-4.1">Section 4.1</a>. Furthermore, a compromised NHDP router can spoof a
large amount of different IP addresses and send HELLOs to its
neighbors to fill their Link/Neighbor Sets. This may result in
memory overflow, and it makes the processing of legitimate HELLO
messages impossible. A compromised NHDP router can also use link
spoofing in its HELLO messages, generating huge 2-hop Sets in
adjacent NHDP routers and therefore potentially a memory overflow.
Moreover, protocols such as SMF and OLSRv2, using the 2-hop
information for multipoint relay (MPR) calculation, may exhaust the
available computational resources of the router if the Neighbor Set
and 2-hop Sets have too many entries.
By exhausting the memory, CPU, and/or channel resources of a router
in a DoS attack or a misconfiguration, NHDP routers may not be able
to accomplish their specified tasks of exchanging 1-hop and 2-hop
neighborhood information, and thereby disturbing the operation of
routing protocols using NHDP.
In some MANETs, the routers are powered by battery. Another
consequence of a DoS attack in such networks is that the power will
be drained quickly by unnecessary processing, transmitting, and
receiving of messages.
<span class="h3"><a class="selflink" id="section-4.3" href="#section-4.3">4.3</a>. Eavesdropping and Traffic Analysis</span>
Eavesdropping, sometimes referred to as sniffing, is a common and
easy passive attack in a wireless environment. Once a packet is
transmitted, any adjacent NHDP router can potentially obtain a copy,
for immediate or later processing. Neither the source nor the
intended destination can detect this. A malicious NHDP router can
eavesdrop on the NHDP message exchange and thus learn the local
topology. It may also eavesdrop on data traffic to learn source and
destination addresses of data packets, or other header information,
as well as the packet payload.
Eavesdropping does not pose a direct threat to the network or to
NHDP, in as much as that it does not alter the information recorded
by NHDP in its information bases and presented to other protocols.
However, eavesdropping can provide network information required for
enabling other attacks, such as the identity of communicating NHDP
routers, detection of link characteristics, and NHDP router
configuration. The compromised NHDP routers may use the obtained
information to launch subsequent attacks, and they may also share
NHDP routing information with other NHDP or non-NHDP entities.
[<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>] would categorize the threat consequence as disclosure.
<span class="grey">Yi, et al. Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
Traffic analysis normally follows eavesdropping, which is the process
of intercepting messages in order to deduce information from
communication patterns. It can be performed even when HELLO messages
are encrypted (encryption is not a part of NHDP), for example:
o Triggered HELLO messages: an attacker could figure out that
messages are triggered and determine that there was a change of
symmetric neighbors of an NHDP router sending the HELLO (as well
get the frequency).
o Message size: the message grows exactly by x bytes per neighbor.
Depending on which cipher is used for the encryption, some
information about the size could be inferred, and thus the number
of neighbors could be guessed.
[<a id="ref-RFC4593">RFC4593</a>] would categorize the threat consequence as disclosure.
<span class="h3"><a class="selflink" id="section-4.4" href="#section-4.4">4.4</a>. Incorrect HELLO Message Generation</span>
An NHDP router performs two distinct tasks: it periodically generates
HELLO messages, and it processes incoming HELLO messages from
neighbor NHDP routers. This section describes security attacks
involving the HELLO generation.
<span class="h4"><a class="selflink" id="section-4.4.1" href="#section-4.4.1">4.4.1</a>. Identity Spoofing</span>
Identity spoofing implies that a compromised NHDP router sends HELLO
messages, pretending to have the identity of another NHDP router, or
even a router that does not exist in the networks. A compromised
NHDP router can accomplish this by using an IP address, which is not
its own, in an address block of a HELLO message, and associating this
address with a LOCAL_IF Address Block TLV [<a href="#ref-IJNSIA2010">IJNSIA2010</a>].
An NHDP router receiving that HELLO message from a neighbor will
assume that it originated from the NHDP router with the spoofed
interface address. As a consequence, it will add a Link Tuple to
that neighbor with the spoofed address, and include it in its next
HELLO messages as a heard neighbor (and possibly as a symmetric
neighbor after another HELLO exchange).
Identity spoofing is particularly harmful if a compromised NHDP
router spoofs the identity of another NHDP router that exists in the
same routing domain. With respect to NHDP, such a duplicated,
spoofed address can lead to an inconsistent state up to two hops from
an NHDP router. [<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>] would categorize the threat consequences
as disclosure and deception.
<span class="grey">Yi, et al. Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
Figure 1 depicts a simple example. In that example, NHDP router A is
in radio range of NHDP router C, but not of the compromised NHDP
router X. If X spoofs the address of A, that can lead to conflicts
for a routing protocol that uses NHDP, and therefore for wrong path
calculations as well as incorrect data traffic forwarding.
.---. .---. .---.
| A |----| C |----| X |
'---' '---' '---'
Figure 1
Figure 2 depicts another example. In this example, NHDP router A is
two hops away from NHDP router C, reachable through NHDP router B.
If the compromised NHDP router X spoofs the address of A, NHDP router
D will take A as its 1-hop neighbor, and C may think that A is indeed
reachable through D.
.---. .---. .---. .---. .---.
| A |----| B |----| C |----| D |----| X |
'---' '---' '---' '---' '---'
Figure 2
<span class="h4"><a class="selflink" id="section-4.4.2" href="#section-4.4.2">4.4.2</a>. Link Spoofing</span>
Similar to identity spoofing, link spoofing implies that a
compromised NHDP router sends HELLO messages, signaling an incorrect
set of neighbors. This is sometimes referred to as falsification
[<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>], and in NHDP it may take either of two forms:
o A compromised NHDP router can postulate addresses of non-present
neighbor NHDP routers in an address block of a HELLO, associated
with LINK_STATUS TLVs.
o A compromised NHDP router can "ignore" otherwise existing
neighbors by not advertising them in its HELLO messages.
The effect of link spoofing with respect to NHDP are twofold,
depending on the two cases mentioned above:
o If the compromised NHDP router ignores existing neighbors in its
advertisements, links will be missing in the information bases
maintained by other routers, and there may not be any connectivity
for these NHDP routers to or from other NHDP routers in the MANET.
<span class="grey">Yi, et al. Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
o On the other hand, if the compromised NHDP router advertises
nonexistent links, this will lead to inclusion of topological
information in the information base, describing nonexistent links
in the network (which, then, may be used by other protocols using
NHDP in place of other, existing, links).
[<a id="ref-RFC4593">RFC4593</a>] would categorize the threat consequences as usurpation,
deception, and disruption.
<span class="h3"><a class="selflink" id="section-4.5" href="#section-4.5">4.5</a>. Replay Attack</span>
A replay attack implies that control traffic from one region of the
network is recorded and replayed in a different region at (almost)
the same time, or in the same region at a different time. This may,
for example, happen when two compromised NHDP routers collaborate on
an attack, one recording traffic in its proximity and tunneling it to
the other compromised NHDP router, which replays the traffic. In a
protocol where links are discovered by testing reception, this will
result in extraneous link creation (basically, a "virtual" link
between the two compromised NHDP routers will appear in the
information bases of neighboring NHDP routers). [<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>] would
categorize this as a falsification and interference threat with
threat consequences of usurpation, deception, and disruption.
While this situation may result from an attack, it may also be
intentional: if data traffic is also relayed over the "virtual" link,
the link being detected is indeed valid for use. This is, for
instance, used in wireless repeaters. If data traffic is not carried
over the virtual link, an imaginary, useless link between the two
compromised NHDP routers has been advertised and is being recorded in
the information bases of their neighboring NHDP routers.
Compared to incorrect HELLO message attacks described in <a href="#section-4.4">Section 4.4</a>,
the messages used in replay attacks are legitimate messages sent out
by (non-malicious) NHDP routers and replayed at a later time or
different locality by malicious routers. This makes this kind of
attack harder to be detect and to counteract; integrity checks cannot
help in this case, as the original message's Integrity Check Value
(ICV) was correctly calculated.
<span class="h3"><a class="selflink" id="section-4.6" href="#section-4.6">4.6</a>. Message Timing Attacks</span>
In NHDP, each HELLO message contains a "validity time" (the amount of
time that information in that control message should be considered
valid before being discarded) and may contain an "interval time"
field (the amount of time until the next control message of the same
type should be expected) [<a href="./rfc5497" title=""Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs)"">RFC5497</a>].
<span class="grey">Yi, et al. Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
<span class="h4"><a class="selflink" id="section-4.6.1" href="#section-4.6.1">4.6.1</a>. Interval Time Attack</span>
A use of the expected interval between two successive HELLO messages
is for determining the link quality in NHDP: if messages are not
received within the expected intervals (e.g., a certain fraction of
messages are missing), then this may be used to exclude a link from
being considered as useful, even if (some) bidirectional
communication has been verified. If a compromised NHDP router X
spoofs the identity of an existing NHDP router A and sends HELLOs
indicating a low interval time, an NHDP router B receiving this HELLO
will expect the following HELLO to arrive within the interval time
indicated. If that expectation is not met, the link quality for the
link A-B will be decreased. Thus, X may cause NHDP router B's
estimate of the link quality for the link A-B to fall below the
minimum considered useful, so the link would not be used
[<a href="#ref-CPSCOM2011">CPSCOM2011</a>]. [<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>] would categorize the threat consequence as
usurpation.
<span class="h4"><a class="selflink" id="section-4.6.2" href="#section-4.6.2">4.6.2</a>. Validity Time Attack</span>
A compromised NHDP router X can spoof the identity of an NHDP router
A and send a HELLO using a low validity time (e.g., 1 ms). A
receiving NHDP router B will discard the information upon expiration
of that interval, i.e., a link between NHDP router A and B will be
"torn down" by X. The sending of a low validity time can be caused
by intended malicious behaviors or simply misconfiguration in the
NHDP routers. [<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>] would categorize the threat consequence as
usurpation.
<span class="h3"><a class="selflink" id="section-4.7" href="#section-4.7">4.7</a>. Indirect Channel Overloading</span>
Indirect Channel Overloading is when a compromised NHDP router X by
its actions causes other legitimate NHDP routers to generate
inordinate amounts of control traffic. This increases channel
occupation and the overhead in each receiving NHDP router that
processes this control traffic. With this traffic originating from
legitimate NHDP routers, the malicious device may remain undetected
in the wider network. It is a form of interference and overload with
the threat consequence of disruption [<a href="./rfc4593" title=""Generic Threats to Routing Protocols"">RFC4593</a>].
Figure 3 illustrates Indirect Channel Overloading with NHDP. A
compromised NHDP router X advertises a symmetric spoofed link to the
nonexistent NHDP router B (at time t0). Router A selects X as MPR
upon reception of the HELLO then triggers a HELLO at t1. Overhearing
this triggered HELLO, the attacker sends another HELLO at t2,
advertising the link to B as lost; this causes NHDP router A to
<span class="grey">Yi, et al. Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
deselect the attacker as MPR, and to send another triggered message
at t3. The cycle may be repeated, where the link X-B is advertised
alternately as LOST and SYM.
MPRs(X) MPRs()
.---. .---. .---. .---.
| A | | A | | A | | A |
'---' '---' '---' '---'
| | | |
| SYM(B) | | LOST(B) |
| | | |
.---. .---. .---. .---.
| X | | X | | X | | X |
'---' '---' '---' '---'
. .
. .
. .
..... .....
. B . . B .
..... .....
t0 t1 t2 t3
Figure 3
<span class="h3"><a class="selflink" id="section-4.8" href="#section-4.8">4.8</a>. Attack on Link Quality Update</span>
According to NHDP [<a href="./rfc6130" title=""Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)"">RFC6130</a>]:
Link quality is a mechanism whereby a router MAY take
considerations other than message exchange into account for
determining when a link is and is not a candidate for being
considered as HEARD or SYMMETRIC. As such, it is a "link
admission" mechanism.
<a href="#section-14.4">Section 14.4</a> of NHDP [<a href="./rfc6130" title=""Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP)"">RFC6130</a>] then lists several examples of which
information can be used to update link quality. One of the listed
examples uses packet exchanges between neighbor routers (as described
in [<a href="./rfc5444" title=""Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format"">RFC5444</a>]), e.g., an NHDP router may update the link quality of a
neighbor based on receipt or loss of packets if they include a
sequential packet sequence number.
NHDP does not specify how to acquire link quality updates
normatively; however, attack vectors may be introduced if an
implementation chooses to calculate link quality based on packet
sequence numbers. The consequences of such threats would depend on
specific implementations. For example, if the link quality update is
based on a sequential packet sequence number from neighbor routers, a
<span class="grey">Yi, et al. Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
compromised NHDP router can spoof packets appearing to be from
another legitimate NHDP router that skips some packet sequence
numbers. The NHDP router receiving the spoofed packets may degrade
the link quality as it appears that several packets have been
dropped. Eventually, the router may remove the neighbor when the
link quality drops below HYST_REJECT.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Impact of Inconsistent Information Bases on Protocols using NHDP</span>
This section describes the impact on protocols that use NHDP when
NHDP fails to obtain and represent accurate information, possibly as
a consequence of the attacks described in <a href="#section-4">Section 4</a>. This
description emphasizes the impacts on the MANET protocols OLSRv2
[<a href="./rfc7181" title=""The Optimized Link State Routing Protocol Version 2"">RFC7181</a>] and SMF [<a href="./rfc6621" title=""Simplified Multicast Forwarding"">RFC6621</a>].
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. MPR Calculation</span>
MPR selection (as used in [<a href="./rfc7181" title=""The Optimized Link State Routing Protocol Version 2"">RFC7181</a>] and [<a href="./rfc6621" title=""Simplified Multicast Forwarding"">RFC6621</a>], for example) uses
information about a router's 1-hop and 2-hop neighborhood, assuming
that (i) this information is accurate, and (ii) each 1-hop neighbor
is apt to act as MPR, depending on the willingness it reports. Thus,
a compromised NHDP router may seek to manipulate the 1-hop and 2-hop
neighborhood information in a router so as to cause the MPR selection
to fail, leading to a flooding disruption of traffic control
messages. This can result in incomplete topology advertisement or
can degrade the optimized flooding to classical flooding.
<span class="h4"><a class="selflink" id="section-5.1.1" href="#section-5.1.1">5.1.1</a>. Flooding Disruption due to Identity Spoofing</span>
A compromised NHDP router can spoof the identify of other routers in
order to disrupt the MPR selection, so as to prevent certain parts of
the network from receiving flooded traffic [<a href="#ref-IJNSIA2010">IJNSIA2010</a>].
In Figure 4, a compromised NHDP router X spoofs the identity of B.
The link between X and C is correctly detected and listed in X's
HELLOs. Router A will receive HELLOs indicating links from B:{B-E},
X:{X-C, X-E}, and D:{D-E, D-C}, respectively. For router A, X and D
are equal candidates for MPR selection. To make sure the X can be
selected as MPR for router A, X can set its willingness to the
maximum value.
<span class="grey">Yi, et al. Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
.---. .---. .---.
| E |----| D |----| C |
'---' '---' '---'
| | .
| | .
.---. .---. .---.
| B |----| A |----| X |
'---' '---' '---'
spoofs B
Figure 4
If B and X (i) accept MPR selection and (ii) forward flooded traffic
as if they were both B, identity spoofing by X is harmless. However,
if X does not forward flooded traffic (i.e., does not accept MPR
selection), its presence entails flooding disruption: selecting B
over D renders C unreachable by flooded traffic.
.---.
| D |
'---'
|
|
.---. .---. .---. .---. .---.
| X |----| A |----| B |----| C |----| E |...
'---' '---' '---' '---' '---'
spoofs E
Figure 5
In Figure 5, the compromised NHDP router X spoofs the identity of E,
i.e., routers A and C both receive HELLOs from a router identifying
itself as E. For router B, routers A and C present the same neighbor
sets and are equal candidates for MPR selection. If router B selects
only router A as MPR, C will not relay flooded traffic from B or
transiting via B, and router X (and routers to the "right" of it)
will not receive flooded traffic.
<span class="h4"><a class="selflink" id="section-5.1.2" href="#section-5.1.2">5.1.2</a>. Flooding Disruption due to Link Spoofing</span>
A compromised NHDP router can also spoof links to other NHDP routers,
thereby making itself appear as the most appealing candidate to be
MPR for its neighbors, possibly to the exclusion of other NHDP
routers in the neighborhood. (In particular, this can occur if the
compromised NHDP router spoofs links to all other NHDP routers in the
neighborhood, plus to one NHDP router outside the neighborhood.) By
thus excluding other legitimate NHDP routers from being selected as
MPR, the compromised NHDP router will receive and be expected to
<span class="grey">Yi, et al. Informational [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
relay all flooded traffic (e.g., traffic control messages in OLSRv2
or data traffic in SMF) that it can then drop or otherwise
manipulate.
In the network in Figure 6, the compromised NHDP router X spoofs
links to the existing router C, as well as to a fictitious W. Router
A receives HELLOs from X and B, reporting X: {X-C, X-W}, B: {B-C}.
All else being equal, X appears a better choice for MPR than B, as X
appears to cover all neighbors of B, plus W.
,---. .....
| S | . C .
'---' .....
| .
| .
.---. .---. .---. .---. .---.
| D |----| C |----| B |----| A |----| X |
'---' '---' '---' '---' '---'
.
.
.....
. W .
.....
Figure 6
As router A will not select B as MPR, B will not relay flooded
messages received from router A. The NHDP routers on the left of B
(starting with C) will, thus, not receive any flooded messages from
router A or transiting router A (e.g., a message originating from S).
<span class="h4"><a class="selflink" id="section-5.1.3" href="#section-5.1.3">5.1.3</a>. Broadcast Storm</span>
A compromised NHDP router may attack the network by attempting to
degrade the performance of optimized flooding algorithms so as to be
equivalent to classic flooding. This can be achieved by forcing an
NHDP router into choosing all its 1-hop neighbors as MPRs. In
MANETs, a broadcast storm caused by classic flooding is a serious
problem that can result in redundancy, contention, and collisions
[<a href="#ref-MOBICOM99">MOBICOM99</a>].
As shown in Figure 7, the compromised NHDP router X spoofs the
identity of NHDP router B and, spoofs a link to router Y {B-Y} (Y
does not have to exist). By doing so, the legitimate NHDP router A
has to select the legitimate NHDP router B as its MPR in order for it
to reach all its 2-hop neighbors. The compromised NHDP router Y can
<span class="grey">Yi, et al. Informational [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
perform this identity-and-link spoofing for all of NHDP router A's
1-hop neighbors, thereby forcing NHDP router A to select all its
neighbors as MPR and disabling the optimization sought by the MPR
mechanism.
.---.
| B |
'---'
|
|
.---. .---. .....
| A |----| X | . . . Y .
'---' '---' .....
spoofs B
Figure 7
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. Routing Loops</span>
Inconsistent information bases, provided by NHDP to other protocols,
can also cause routing loops. In Figure 8, the compromised NHDP
router X spoofs the identity of NHDP router E. NHDP router D has
data traffic to send to NHDP router A. The topology recorded in the
information base of router D indicates that the shortest path to
router A is {D->E->A}, because of the link {A-E} reported by X.
Therefore, the data traffic will be routed to NHDP router E. As the
link {A-E} does not exist in NHDP router E's information bases, it
will identify the next hop for data traffic to NHDP router A as being
NHDP router D. A loop between the NHDP routers D and E is thus
created.
.---. .---. .---. .---. .---.
| A |----| B |----| C |----| D |----| E |
'---' '---' '---' '---' '---'
|
|
.---.
| X |
'---'
spoofs E
Figure 8
<span class="grey">Yi, et al. Informational [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
<span class="h3"><a class="selflink" id="section-5.3" href="#section-5.3">5.3</a>. Invalid or Nonexistent Paths to Destinations</span>
By reporting inconsistent topology information in NHDP, the invalid
links and routers can be propagated as link state information with
traffic control messages and results in route failure. As
illustrated in Figure 8, if NHDP router B tries to send data packets
to NHDP router E, it will choose router A as its next hop, based on
the information about the nonexistent link {A-E} reported by the
compromised NHDP router X.
<span class="h3"><a class="selflink" id="section-5.4" href="#section-5.4">5.4</a>. Data Sinkhole</span>
With the ability to spoof multiple identities of legitimate NHDP
routers (by eavesdropping, for example), the compromised NHDP router
can represent a "data sinkhole" for its 1-hop and 2-hop neighbors.
Data packets that come across its neighbors may be forwarded to the
compromised NHDP router instead of to the real destination. The
packet can then be dropped, manipulated, duplicated, etc., by the
compromised NHDP router. As shown in Figure 8, if the compromised
NHDP router X spoofs the identity of NHDP router E, all the data
packets to E that cross NHDP routers A and B will be sent to NHDP
router X, instead of to E.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Future Work</span>
This document does not propose solutions to mitigate the security
threats described in <a href="#section-4">Section 4</a>. However, this section aims at
driving new work by suggesting which threats discussed in <a href="#section-4">Section 4</a>
could be addressed by deployments or applications.
o <a href="#section-4.1">Section 4.1</a>: Jamming - If a single router or a small area of the
MANET is jammed, protocols could be specified that increase link
metrics in NHDP for the jammed links. When a routing protocol
such as OLSRv2 uses NHDP for neighborhood discovery, other paths
leading "around" the jammed area would be preferred, and therefore
would mitigate the threat to some extent.
o <a href="#section-4.2">Section 4.2</a>: DoS - A DoS attack using a massive amount of HELLO
messages can be mitigated by admitting only trusted routers to the
network. [<a href="./rfc7185" title=""Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)"">RFC7185</a>] specifies a mechanism for adding Integrity
Check Values (ICVs) to HELLO messages and therefore providing an
admittance mechanism for NHDP routers to a MANET. (Note that
adding ICVs creates a new DoS attack vector, as ICV verification
requires CPU and memory resources.) However, using ICVs does not
address the problem of compromised routers. Detecting compromised
routers could be addressed in new work. [<a href="./rfc7185" title=""Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)"">RFC7185</a>] mandates
implementation of a security mechanism that is based on shared
keys and makes excluding single compromised routers difficult;
<span class="grey">Yi, et al. Informational [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
work could be done to facilitate revocation mechanisms in certain
MANET use cases where routers have sufficient capabilities to
support asymmetric keys.
o <a href="#section-4.3">Section 4.3</a>: Eavesdropping - [<a href="./rfc7185" title=""Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)"">RFC7185</a>] adds ICVs to HELLO messages
but does not encrypt them. Therefore, eavesdropping of control
traffic is not mitigated. Future work could provide encryption of
control traffic for sensitive MANET topologies. Note that, other
than using a single shared secret key, providing encryption of
traffic among a set of neighbors (when that set is potentially
undetermined) is nontrivial, especially without multiplying
overheads. With traffic analysis, attackers could still deduce
the network information like HELLO message triggering and HELLO
message size, even though the HELLO messages are encrypted.
o <a href="#section-4.4.2">Section 4.4.2</a>: Link spoofing - [<a href="./rfc7185" title=""Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)"">RFC7185</a>] provides certain
protection against link spoofing, but an NHDP router has to
"trust" the originator of a HELLO that the advertised links are
correct. For example, if a router A reports a link to B, routers
receiving HELLOs from A have to trust that B is actually a
(symmetric) neighbor of A. New protocol work could address
protection of links without overly increasing the space and time
overheads. An immediate suggestion for deployments is to protect
routers against being compromised and to distribute keys only to
trusted routers.
o <a href="#section-4.5">Section 4.5</a>: Replay Attacks - [<a href="./rfc7185" title=""Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)"">RFC7185</a>] uses ICVs and timestamps
to provide some protection against replay attacks. It is still
feasible to replay control messages within a limited time. A
suggestion for deployments is to provide time synchronization
between routers. New work could provide time synchronization
mechanisms for certain MANET use cases or specify a mechanism
using nonces instead of timestamps in HELLO messages.
o <a href="#section-4.4.1">Section 4.4.1</a>: Identity spoofing; <a href="#section-4.6">Section 4.6</a>: Message timing
attacks; <a href="#section-4.7">Section 4.7</a>: Indirect channel overloading; and
<a href="#section-4.8">Section 4.8</a>: Attack on link quality update - [<a href="./rfc7185" title=""Integrity Protection for the Neighborhood Discovery Protocol (NHDP) and Optimized Link State Routing Protocol Version 2 (OLSRv2)"">RFC7185</a>] provides
protection against these attacks, assuming the routers are not
compromised.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Security Considerations</span>
This document does not specify a protocol or a procedure. The
document, however, reflects on security considerations for NHDP and
MANET routing protocols using NHDP for neighborhood discovery.
<span class="grey">Yi, et al. Informational [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. Acknowledgments</span>
The authors would like to gratefully acknowledge the following people
for valuable comments and technical discussions: Teco Boot, Henning
Rogge, Christopher Dearlove, John Dowdell, Joseph Macker, and all the
other participants of the IETF MANET working group.
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. References</span>
<span class="h3"><a class="selflink" id="section-9.1" href="#section-9.1">9.1</a>. Normative References</span>
[<a id="ref-RFC5444">RFC5444</a>] Clausen, T., Dearlove, C., Dean, J., and C. Adjih,
"Generalized Mobile Ad Hoc Network (MANET) Packet/Message
Format", <a href="./rfc5444">RFC 5444</a>, February 2009.
[<a id="ref-RFC5497">RFC5497</a>] Clausen, T. and C. Dearlove, "Representing Multi-Value
Time in Mobile Ad Hoc Networks (MANETs)", <a href="./rfc5497">RFC 5497</a>, March
2009.
[<a id="ref-RFC6130">RFC6130</a>] Clausen, T., Dearlove, C., and J. Dean, "Mobile Ad Hoc
Network (MANET) Neighborhood Discovery Protocol (NHDP)",
<a href="./rfc6130">RFC 6130</a>, April 2011.
<span class="h3"><a class="selflink" id="section-9.2" href="#section-9.2">9.2</a>. Informative References</span>
[<a id="ref-ACCT2012">ACCT2012</a>] Jhaveri, R. and S. Patel, "DoS Attacks in Mobile Ad Hoc
Networks: A Survey", Second International Conference on
Advanced Computing & Communication Technologies (ACCT),
January 2012.
[<a id="ref-CPSCOM2011">CPSCOM2011</a>]
Yi, J., Clausen, T., and U. Herberg, "Vulnerability
Analysis of the Simple Multicast Forwarding (SMF) Protocol
for Mobile Ad Hoc Networks", Proceedings of the IEEE
International Conference on Cyber, Physical, and Social
Computing (CPSCom), October 2011.
[<a id="ref-IJNSIA2010">IJNSIA2010</a>]
Herberg, U. and T. Clausen, "Security Issues in the
Optimized Link State Routing Protocol version 2",
International Journal of Network Security & Its
Applications, April 2010.
[<a id="ref-MANET-MGMT">MANET-MGMT</a>]
Nguyen, J., Cole, R., Herberg, U., Yi, J., and J. Dean,
"Network Management of Mobile Ad hoc Networks (MANET):
Architecture, Use Cases, and Applicability", Work in
Progress, February 2013.
<span class="grey">Yi, et al. Informational [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
[<a id="ref-MGMT-SNAP">MGMT-SNAP</a>]
Clausen, T. and U. Herberg, "Snapshot of OLSRv2-Routed
MANET Management", Work in Progress, February 2014.
[<a id="ref-MOBICOM99">MOBICOM99</a>]
Ni, S., Tseng, Y., Chen, Y., and J. Sheu, "The Broadcast
Storm Problem in a Mobile Ad Hoc Network", Proceedings of
the 5th annual ACM/IEEE international conference on Mobile
computing and networking, 1999.
[<a id="ref-RFC4593">RFC4593</a>] Barbir, A., Murphy, S., and Y. Yang, "Generic Threats to
Routing Protocols", <a href="./rfc4593">RFC 4593</a>, October 2006.
[<a id="ref-RFC4949">RFC4949</a>] Shirey, R., "Internet Security Glossary, Version 2", <a href="./rfc4949">RFC</a>
<a href="./rfc4949">4949</a>, August 2007.
[<a id="ref-RFC6621">RFC6621</a>] Macker, J., "Simplified Multicast Forwarding", <a href="./rfc6621">RFC 6621</a>,
May 2012.
[<a id="ref-RFC6779">RFC6779</a>] Herberg, U., Cole, R., and I. Chakeres, "Definition of
Managed Objects for the Neighborhood Discovery Protocol",
<a href="./rfc6779">RFC 6779</a>, October 2012.
[<a id="ref-RFC7181">RFC7181</a>] Clausen, T., Dearlove, C., Jacquet, P., and U. Herberg,
"The Optimized Link State Routing Protocol Version 2", <a href="./rfc7181">RFC</a>
<a href="./rfc7181">7181</a>, April 2014.
[<a id="ref-RFC7185">RFC7185</a>] Herberg, U., Dearlove, C., and T. Clausen, "Integrity
Protection for the Neighborhood Discovery Protocol (NHDP)
and Optimized Link State Routing Protocol Version 2
(OLSRv2)", <a href="./rfc7185">RFC 7185</a>, April 2014.
<span class="grey">Yi, et al. Informational [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc7186">RFC 7186</a> Security Threats for NHDP April 2014</span>
Authors' Addresses
Jiazi Yi
LIX, Ecole Polytechnique
91128 Palaiseau Cedex
France
Phone: +33 1 77 57 80 85
EMail: jiazi@jiaziyi.com
URI: <a href="http://www.jiaziyi.com/">http://www.jiaziyi.com/</a>
Ulrich Herberg
Fujitsu Laboratories of America
1240 E Arques Ave
Sunnyvale, CA 94085
USA
EMail: ulrich@herberg.name
URI: <a href="http://www.herberg.name/">http://www.herberg.name/</a>
Thomas Heide Clausen
LIX, Ecole Polytechnique
91128 Palaiseau Cedex
France
Phone: +33 6 6058 9349
EMail: T.Clausen@computer.org
URI: <a href="http://www.thomasclausen.org/">http://www.thomasclausen.org/</a>
Yi, et al. Informational [Page 20]
</pre>
|