Mobile Ad hoc Networking (MANET) U. Herberg Internet-DraftT. ClausenFujitsu Laboratories of America Intended status: Informational J. Yi Expires: September 13, 2012 T. Clausen LIX, Ecole PolytechniqueExpires: May 16, 2010 NovemberMarch 12,20092012 Security Threats for NHDPdraft-herberg-manet-nhdp-sec-threats-00draft-herberg-manet-nhdp-sec-threats-01 Abstract This document analyses common security threats of the Neighborhood Discovery Protocol(NHDP)(NHDP), and describes their potential impactsforon MANET routing protocols using NHDP. Status of this Memo This Internet-Draft is submittedto IETFin full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force(IETF), its areas, and its working groups.(IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts.Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.This Internet-Draft will expire onMay 16, 2010.September 13, 2012. Copyright Notice Copyright (c)20092012 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . ..3 3. NHDP Threat Overview . . . . . . . . . . . . . . . . . . . . .34 4. Detailed Threat Descriptionof Security Threats to NHDP. . . . . . . . . . . . . . . . . 4 4.1. Jamming . . . . . . . . . . . . . . . . . . . . . . . . .. 45 4.2. Eavesdropping . . . . . . . . . . . . . . . . . . . . . . 5 4.3. Incorrect HELLO Message Generation . . . . . . . . . . . . 54.2.1.4.3.1. Identity Spoofing . . . . . . . . . . . . . . . . . .. 5 4.2.2.6 4.3.2. Link Spoofing . . . . . . . . . . . . . . . . . . . ..64.3.4.4. ReplayattackAttack . . . . . . . . . . . . . . . . . . . . . . 7 4.5. Sequence Number Attack .6. . . . . . . . . . . . . . . . . 8 4.6. Message Timing Attacks . . . . . . . . . . . . . . . . . . 8 4.6.1. Interval Time Attack . . . . . . . . . . . . . . . . . 8 4.6.2. Validity Time Attack . . . . . . . . . . . . . . . . . 8 4.7. Indirect Jamming . . . . . . . . . . . . . . . . . . . . . 9 5. Impact ofinconsisentinconsistent Information Basesfor Routingon Protocols using NHDP . . . . . . . . . . . . . . . . . . . . .6. . . . . 9 5.1. MPR Calculation . . . . . . . . . . . . . . . . . . . . . 10 5.1.1. Flooding Disruption due to Identity Spoofing .7. . . . 10 5.1.2. Flooding Disruption due to Link Spoofing . . . . . . . 11 5.1.3. Broadcast Storm . . . . . . . . . . . . . . . . . . . 12 5.2. Routing Loops . . . . . . . . . . . . . . . . . . . . . .. 713 5.3. Invalid ornon-existingNon-Existing Paths to Destinations . . . . . .. 713 5.4. Data Sinkhole . . . . . . . . . . . . . . . . . . . . . .. 714 6. Security Considerations . . . . . . . . . . . . . . . . . . . 14 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 8. References .7 7. Security Considerations. . . . . . . . . . . . . . . . . . . .7 8.. . . . . 14 8.1. Normative References . . . . . . . . . . . . . . . . . . . 14 8.2. Informative References . .7. . . . . . . . . . . . . . . . 15 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .815 1. Introduction The Neighborhood Discovery Protocol (NHDP)[NHDP][RFC6130] allows routers toexchangeacquire topological informationabout their one-hop and two-hop neighborsup to two hops away from themselves, bymeansway of periodic HELLOmessages. Itmessage exchanges. The information acquired by NHDP isa common base protocol for several protocols in the MANET working group,used by other protocols, such as OLSRv2 [OLSRv2] and SMF [SMF]. Theneighborhoodtopology information,exchanged between routers usingacquired by way of NHDP, serves these routing protocolsas a baselinefor calculating paths to all destinations in the MANET, for relay set selection fornetwork-wide transmissionsnetwork- wide transmissions, etc.Due to the fact thatAs NHDP is typically used in wireless environments, it is potentially exposed to different kinds of security threats, some of which are of particular significance as compared to wired networks. As wireless radio waves can be captured as well as transmitted by any wireless device within radio range, there is commonly no physical protection as otherwise known for wired networks.The NHDP specification[RFC6130] does not define any explicit securitymeansmeasures for protecting the integrity of the information it acquires, however suggests that this be addressed in a fashion appropriate to the deployment of the network. This documentwill describe these securityanalyses possible attackswhichon NHDPis vulnerable to. In addition, the documentand outlines the consequences of suchsecurityattacks to the state maintained by NHDPfor routingin each router (and, thus, made available to protocols usingNHDP for neighborhood discovery. It is out of scope ofthisdocument to provide solutions to counteract security attacks to NHDP.state). 2. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described inRFC 2119[RFC2119].Additionally, thisThis document uses the terminologyofand notation defined in [RFC5444] and[NHDP].[RFC6130]. Additionally, this document introduces the following terminology: NHDP Router: A MANET router, running NHDP as specified in [RFC6130]. Attacker: A device, present in the network and which intentionally seeks to compromise the information bases in NHDP routers. Compromised NHDP Router: An attacker, present in the network and which generates syntactically correct NHDP control messages. Control messages emitted by a Compromised NHDP router may contain additional information, or omit information, as compared to a control message generated by a non-compromized NHDP router located in the same topological position in the network. Legitimate NHDP Router: An NHDP router, which is not a Compromised NHDP Router. 3. NHDP Threat OverviewNHDP [NHDP][RFC6130] defines amessage exchange protocol based onHELLO messagesin order forexchange, enabling each NHDP router to acquire topological informationaboutdescribing its 1-hop and 2-hopneighbors. It specifies information bases that store the informationneighbors, andthe necessary message exchange. Thesespecifies information basescan be accesses by routing protocols such as OLSRv2 [OLSRv2] to construct routes to destinations in the MANET. Everyfor recording this information. An NHDP router running [RFC6130] periodically transmits HELLO messages using a link-local multicast on each of its interfaces with a hop-limit of 1(i.e.(i.e., HELLOs are neverforwarded by a router).forwarded). In these HELLO messages,aan NHDP router announces the IP addressesofas heard, symmetricandor lost neighbor interface addresses. An adversary has several ways of harmingthethis neighbor discovery process: It can announce "wrong" information about its identity, postulate non-existent links, and replay HELLO messages. These attacks are presented in detail in Section 4. The different ways of attacking an NHDP deploymentwillmay eventually lead to inconsistent information bases, not accurately reflecting the correct topology of theMANET any more. This meansMANET. The consequence hereof is thatrouters may be unable to detect links toprotocols using NHDP will base theirneighbors correctly (for NHDP), and thus corrupt the routing process of aoperation on incorrect information, causing routingprotocol usingprotocols to not be able to calculate correct (or any) paths, degrade theneighbor informationperformance ofNHDP.flooding operations based on reduced relay sets, etc. Theseimplicationsconsequences to protocols usingthe state ofNHDP are described in detaildescribedin Section 5. 4. Detailed Threat Descriptionof Security Threats to NHDP In this section, the different kind of threats to NHDP are detailed.Forevery attack,each threat, described in the below, a description of the mechanism of the corresponding attack is given, followed by a description of how theimplications for the NHDP instance. Implicationsattack affects NHDP. The impacts from each attack onroutingprotocols using NHDP arepresentedgiven in Section 5. Forsimplicity, in all examples containedsimplicity in thefollowing sections, it is assumeddescription, examples given assume that NHDP routersonlyhave a single interface with a single IP address configured. All the attacksapply as wellapply, however, for NHDP routers with multiple interfaces and multipleaddresses.addresses as well. 4.1. Jamming One vulnerability, common for all protocols operating a wireless ad hoc network, is that of"jamming" - i.e."jamming", i.e., that arouterdevice generates massive amounts of interfering radio transmissions, which will prevent legitimate traffic(e.g. control(e.g.,control traffic as well as data traffic) on part of a network.This vulnerability cannot be dealtDepending on lower layers, this may not affect transmissions: HELLO messages from an NHDP router withat L3 (if at all), leaving"jammed" interfaces may be received by other NHDP routers. As [RFC6130] identifies and uses only bi- directional links, a link from a jammed NHDP router to a non-jammed NHDP router would not be considered, and thenetwork withoutjammed NHDP router appear simply as "disconnected" for theability to maintain connectivity. Jamming is somewhat similar to thatun-jammed part of the networkoverload and subsequent denial of service: a sufficiently significant amount of control traffic- which islost, preventing HELLO messagesable tobe correctly received. Ifmaintain accurate topology maps. If, due to a jamming attack, a considerable amount of HELLO messages are lost or corrupted due to collisions, neighbor NHDP routers areablenotany moreable to establish links betweenthem. This effectively rendersthem any more. Thus, NHDPunusable for upper layer protocols, since no stable linkswill present empty information bases to the protocols using it. 4.2. Eavesdropping Eavesdropping is a common and easy passive attack in a wireless environment. Once a packet is transmitted, any adjacent NHDP router canbe usedpotentially obtain a copy, forsending out controlimmediate or later processing. Neither the source nor the intended destination can detect this. A malicious NHDP router can eavesdrop on the NHDP message exchange and thus learn the local topology. It may also eavesdrop on data traffic to learn source and destination addresses of data packets, or other header information, as well as the packet payload. Eavesdropping does not pose a direct threat to the network nor to NHDP, in as much as that it does not alter the information recorded by NHDP in its information bases and presented to other protocols using it, but it can provide network information required forcalculating routing information. 4.2.enabling other attacks, such as the identity of communicating NHDP routers, link characteristic, NHDP router configuration, etc. 4.3. Incorrect HELLO Message GenerationEveryAn NHDP router runningNHDP[RFC6130] performsmainlytwo distinct tasks:Periodically generatingit periodically generates HELLOmessagesmessages, andprocessingit processes incoming HELLO messages from neighbor NHDP routers. This section describestwosecurity attacks involving the HELLO generation.4.2.1.4.3.1. Identity SpoofingThe so-called identityIdentity spoofing implies that a Compromised NHDP router sends HELLOmessagesmessages, pretending to have the identity of another NHDP router.An attackerA Compromised NHDP router can accomplish this by using another NHDP router's IP address in an address block of aHELLO,HELLO message, and associating this address with a LOCAL_IF Address Block TLV.In addition, it may need to set the source address of the IP header that contains the control message. If aAn NHDP routerreceives such a forgedreceiving the HELLO message from a neighbor,itwill assume thatthis HELLO comesit originated fromathe NHDP router with theclaimedspoofed interface address. As a consequence, it will add a Link Tuple to that neighbor with the spoofed address, and include it in its next HELLO messages as a heard neighbor (and possibly as symmetric neighbor after another HELLO exchange). Identity spoofing is particular harmful if a Compromised NHDP router spoofs the identity of another NHDP router that exists in the same routing domain. With respect to NHDP, such a duplicated, spoofed address can lead to an inconsistent state up to two hops fromaan NHDP router. Figure1)1 depicts a simple example. In that example, NHDP router A is in radio range of C, but not of the Compromised NHDP router X. If X spoofs the address of A, that can lead to conflicts for upper-layer routing protocols, and therefore for wrong path calculations as well as incorrect data traffic forwarding.,---. ,---. ,---..---. .---. .---. | A |----| C |----| X |'---` '---` '---`'---' '---' '---' Figure 1 Figure2)2 depicts another example. In this example, A is two hops away from NHDP router C, reachable through NHDP router B. If theattackerCompromised NHDP router X spoofs the address of A, C may think that A is indeed reachable through NHDP router D.,---. ,---. ,---. ,---. ,---..---. .---. .---. .---. .---. | A |----| B |----| C |----| D |----| X |'---` '---` '---` '---` '---`'---' '---' '---' '---' '---' Figure 24.2.2.4.3.2. Link SpoofingSimilarly,Similar to identity spoofing, link spoofing implies that a Compromised NHDP router sends HELLO messages, signaling an incorrect set of neighbors. This may take either of two forms:An attackero A Compromised NHDP Router can postulate addresses of non-present neighbor NHDP routers in an address block of a HELLO, associated with LINK_STATUS TLVs.Alternatively, a compromisedo A Compromised NHDP router can "ignore" otherwise existing neighbors by notadvertizingadvertising them in its HELLO messages. The effect of link spoofing with respect to NHDP are twofold, depending on the two cases mentioned above: If thecompromisedCompromised NHDP router ignores existingneighbors,neighbors in its advertisements, links will be missing in the information bases maintained by other routers, and there may not be any connectivity to or from these NHDP routers to others NHDP routers in the MANET. If, on the other hand, the Compromised NHDP routeradvertizingadvertises non-existing links, thiscanwill leadwrongto inclusion of topological information in the information base,whichdescribing non-existing links in the network (which, then, may be used byrouting protocols. 4.3.other protocols using NHDP in place of other, existing, links). 4.4. ReplayattackAttack A replay attackis, simply, whereimplies that control traffic from one region of the network is recorded and replayed in a different region (this type of attack is also known as the Wormhole attack). This may, for example, happen when two Compromised NHDP routers collaborate on an attack, one recording traffic in its proximity and tunneling it to the other Compromised NHDP router, which replays the traffic. In a protocol where links are discovered by testing reception, this will result in extraneous link creation (basically, a "virtual" link between the two``attacking''Compromised NHDP routers will appear in the information bases of neighboring NHDP routers). While this situation may result from an attack,we note thatit may also be intentional: if data-traffictooalso is relayed over thevirtual link over the ``tunnel'',"virtual" link, the link being detectedis,is indeedvalid.valid for use. This is, for instance, used in wireless repeaters. If data traffic is not carried over the virtual link, an imaginary,compromised,useless, link between the two Compromised NHDP routers, has beencreated.advertised, and is being recorded in the information bases of their neighboring NHDP routers. Replay attacks can be especially damaging if coupled with spoofing andplayingtampering with sequence numbers in the replayed messages, potentially destroying some important topology information in NHDP routers all over the network, as described in Section 4.5. 4.5. Sequence Number Attack [RFC6130] uses message sequence numbers, to avoid processing and forwarding the same message more than once. An attack may consist of a Compromised NHDP router, spoofing the identity of another Legitimate NHDP router in the network and transmitting a large number of HELLO messages, each with different message sequence numbers. Subsequent HELLOs with the same sequence numbers, originating from theLegitimate NHDP router whose identity was spoofed, would hence be ignored, until eventually information concerning these "spoofed" HELLO messages expires. As illustrated in Figure 1, if the Compromised NHDP router X spoofs the identify of NHDP router A, and broadcasts several HELLO messages, all the valid HELLO messages sent by A with the same sequence numbers will be discarded by C, until the information concerning these HELLOs expire. 4.6. Message Timing Attacks In [RFC6130], each HELLO message contains a "validity time" and may contain an "interval time" field, identifying the time for which information in that control message should be considered valid until discarded, and the time until the next control message of the same type should be expected [RFC5497]. 4.6.1. Interval Time Attack A use of the expected interval between two successive HELLO messages is for determining the link quality in [RFC6130]: if messages are not received within the expected intervals (e.g., a certain fraction of messages are missing), then this may be used to exclude a link from being considered as useful, even if (some) bi-directional communication has been verified. If a Compromised NHDP router X spoofs the identity of an existing NHDP router A, and sends HELLOs indicating a low interval time, an NHDP router B receiving this HELLO will expect the following HELLO to arrive within the interval time indicated - or otherwise, decrease the link quality for the link A-B. Thus, X may cause NHDP router B's estimate of the link quality for the link A-B to fall below the limit, where it is no longer considered as useful and, thus, not used. 4.6.2. Validity Time Attack A Compromised NHDP router X can spoof the identity of an NHDP router A and send a HELLO using a low validity time (e.g.,1 ms). A receiving NHDP router B will discard the information upon expiration of that interval, i.e., a link between NHDP router A and B will be "torn down" by X. 4.7. Indirect Jamming Indirect jamming is when a Compromised NHDP router X by its actions causes other legitimate NHDP routers to generate inordinate amounts of control traffic. This increases channel occupation, and the overhead in each receiving NHDP router processing this control traffic. With this traffic originating from Legitimate NHDP routers, the malicious device may remain undetected to the wider network. Figure 3 illustrates indirect jamming of [RFC6130]. A Compromised NHDP router X advertises a symmetric spoofed link to the non-existing NHDP router B (at time t0). Router A selects X as MPR upon reception of the HELLO, and will trigger a HELLO at t1. Overhearing this triggered HELLO, the attacker sends another HELLO at t2, advertising the link to B as lost, which leads to NHDP router A deselecting the attacker as MPR, and another triggered message at t3. The cycle may be repeated, alternating advertising the link X-B as LOST and SYM. MPRs(X) MPRs() .---. .---. .---. .---. | A | | A | | A | | A | '---' '---' '---' '---' | | | | | SYM(B) | | LOST(B) | | | | | .---. .---. .---. .---. | X | | X | | X | | X | '---' '---' '---' '---' . . . . . . ..... ..... . B . . B . ..... ..... t0 t1 t2 t3 Figure 3 5. Impact ofinconsisentinconsistent Information Basesfor Routingon Protocols using NHDPThe different security attacksThis section describes the impact on protocols, using NHDP, of NHDPhave been presentedfailing to obtain and represent accurate information, possibly as a consequence of the attacks described in Section4 which lead4. This description emphasizes the impacts on the MANET protocols OLSRv2 [OLSRv2], and SMF [SMF]. 5.1. MPR Calculation MPR selection (as used in e.g., [OLSRv2] and [SMF]) uses information about a router's 1-hop and 2-hop neighborhood, assuming that (i) this information is accurate, and (ii) all 1-hop neighbors are apt toan inconsistent stateact as as MPR, depending on the willingness they report. Thus, a Compromised NHDP router will seek to manipulate the 1-hop and 2-hop neighborhood information in a router such as to cause the MPR selection to fail, leading to a flooding disruption of TC messages. 5.1.1. Flooding Disruption due to Identity Spoofing A Compromised NHDP router can spoof thetopology onidentify of other routers, to disrupt therouters. This section describesMPR selection, so as to cache certain parts of theimpactnetwork from the flooding traffic. In Figure 4, a Compromised NHDP router X spoofs the identity of B. The link between X and C is correctly detected and listed in X's HELLOs. Router A will receive HELLOs indicating links from, respectively B:{B-E}, X:{X-C, X-E}, and D:{D-E, D-C}. For router A, X and D are equal candidates forrouting protocols that useMPR selection. To make sure the X can be selected as MPR for router A, X can set its willingness to the maximum value. .---. .---. .---. | E |----| D |----| C | '---' '---' '---' | | . | | . .---. .---. .---. | B |----| A |----| X | '---' '---' '---' spoofs B Figure 4 If B and X (i) accept MPR selection and (ii) forward flooded traffic as-if they were both B, identity spoofing by X is harmless. However, if X does not forward flooded traffic (i.e., does not accept MPR selection), its presence entails flooding disruption: selecting B over D renders C unreachable by flooded traffic. .---. | D | '---' | | .---. .---. .---. .---. .---. | X |----| A |----| B |----| C |----| E |... '---' '---' '---' '---' '---' spoofs E Figure 5 In Figure 5, the Compromised NHDP router X spoofs the identity of E, i.e.,router A and C both receive HELLOs from a router identifying asunderlyingE. For router B, A and C present the same neighbordiscovery protocol,sets, and are equal candidates for MPR selection. If router B selects only router A as MPR, C will not relay flooded traffic from or transiting via B, and router X (and routers to the "right" of it) will not receive flooded traffic. 5.1.2. Flooding Disruption due to Link Spoofing A Compromised NHDP router can also spoof links to other NHDP routers, and thereby makes itself appear as the most appealing candidate of MPR for its neighbors, possibly to the exclusion of other NHDP routers in the neighborhood (this, in particular, if the Compromised NHDP router spoof links to all other NHDP routers in the neighborhood, plus to one other NHDP router). By thus excluding other legitimate NHDP routers from being selected as MPR, the Compromised NHDP router will receive and be expected to relay all flooded traffic (e.g., TC messages inparticularOLSRv2[OLSRv2],or data traffic in SMF) - which it can then drop or otherwise manipulate. In the network in Figure 6, the Compromised NHDP router X spoofs links to the existing router C, as well as to a fictitious W. Router A receives HELLOs from X andSMF. 5.1.B, reporting X: {X-C, X-W}, b: {B-C}. All else being equal, X appears a better choice as MPRCalculation TBDthan B, as X appears to cover all neighbors of B, plus W. ,---. ..... | S | . C . '---' ..... | . | . .---. .---. .---. .---. .---. | D |----| C |----| B |----| A |----| X | '---' '---' '---' '---' '---' . . ..... . w . ..... Figure 6 As router A will not select B as MPR, B will not relay flooded messages received from router A. The NHDP routers on the left of B (starting with C) will, thus, not receive any flooded messages from or transiting NHDP router A (e.g., a message originating from S). 5.1.3. Broadcast Storm Compromised NHDP router may attack the network by attempting to degrade the performance of optimized flooding algorithms so as to be equivalent to classic flooding. This can be achieved by forcing an NHDP router into choosing all its 1-hop neighbors as MPRs. In MANETs, a broadcast storm caused by classic flooding is a serious problem which can result in redundancy, contention and collisions [broadcast-storm]. As shown in Figure 7, the Compromised NHDP router X spoofs the identity of NHDP router B and, spoofs a link to router Y {B-Y} (Y does not have to be exist). By doing so, the legitimate NHDP router A has to select the legitimate NHDP router B as its MPR, in order for it to reach all its 2-hop neighbors. The Compromised NHDP router Y can perform this identity+link spoofing for all of NHDP router A's 1-hop neighbors, thereby forcing NHDP router A to select all its neighbors as MPR - disabling the optimization sought by the MPR mechanism. .---. | B | '---' | | .---. .---. ..... | A |----| X | . . . Y . '---' '---' ..... spoofs B Figure 7 5.2. Routing LoopsTBDInconsistent information bases, provided by NHDP to other protocols, can also cause routing loops. In Figure 8, the Compromised NHDP router X spoofs the identity of NHDP router E. NHDP router D has data traffic to send to NHDP router A. The topology recorded in the information base of router D indicates that the shortest path to router A is {D->E->A}, because of the link {A-E} reported by X. Therefore, the data traffic will be routed to the NHDP router E. As the link {A-E} does not exist in NHDP router E's information bases, it will identify the next hop for data traffic to NHDP router A as being NHDP router D. A loop between the NHDP routers D and E is thus created. .---. .---. .---. .---. .---. | A |----| B |----| C |----| D |----| E | '---' '---' '---' '---' '---' | | .---. | X | '---' spoofs E Figure 8 5.3. Invalid ornon-existingNon-Existing Paths to DestinationsTBDBy reporting inconsistent topology information in NHDP, the invalid links/routers can be propagated as link state information with TC messages and results in route failure. As illustrated in Figure 8, if NHDP router B tries to send data packets to NHDP router E, it will choose router A as its next hop, based on the information of non- existing link {A-E} reported by the Compromised NHDP router X. 5.4. Data SinkholeTBD 6. IANA Considerations This document contains no actionsWith the ability to spoof multiple identities of legitimate NHDP routers (by eavesdropping, forIANA. 7.example), the Compromised NHDP router can represent a "data sinkhole" for its 1-hop and 2-hop neighbors. Data packets that come across its neighbors may be forwarded to the Compromised NHDP router instead of to the real destination. The packet can then be dropped, manipulated, duplicated, etc., by the Compromised NHDP router. As shown in Figure 8, if the Compromised NHDP router X spoofs the identity of NHDP router E, all the data packets to E that cross NHDP routers A and B will be sent to NHDP router X, instead of to E. 6. Security Considerations This document does not specify a protocol or a procedure. The document, however, reflects on security considerations for NHDP and MANET routing protocols using NHDP for neighborhood discovery. 7. IANA Considerations This document contains no actions for IANA. 8. References 8.1. Normative References[NHDP] Clausen, T., Dean, J., and C. Dearlove, "MANET Neighborhood Discovery Protocol (NHDP)", work in progress draft-ietf-manet-nhdp-11.txt, October 2009. [OLSRv2] Clausen, T., Dearlove, C., and P. Philippe, "The Optimized Link State Routing Protocol version 2", work in progress draft-ietf-manet-olsrv2-10.txt, September 2009.[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC5444] Clausen, T., Dearlove, C., Dean, J., and C. Adjih, "Generalized MANET Packet/Message Format", RFC 5444, February 2009. [RFC5497] Clausen, T. and C. Dearlove, "Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs)", RFC 5497, March 2009. [RFC6130] Clausen, T., Dean, J., and C. Dearlove, "MANET Neighborhood Discovery Protocol (NHDP)", RFC 6130, April 2011. 8.2. Informative References [OLSRv2] Clausen, T., Dearlove, C., Philippe, P., and U. Ulrich, "The Optimized Link State Routing Protocol version 2", work in progress draft-ietf-manet-olsrv2-14.txt, March 2012. [SMF] Macker, J., "Simplified Multicast Forwarding", work in progressdraft-ietf-manet-smf-09.txt, July 2009.draft-ietf-manet-smf-14.txt, March 2012. [broadcast-storm] Ni, S., Tseng, Y., Chen, Y., and J. Sheu, "The Broadcast Storm Problem in a Mobile Ad Hoc Network", Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, 1999. Authors' Addresses Ulrich Herberg Fujitsu Laboratories of America 1240 E Arques Ave Sunnyvale, CA 94085 USA Email: ulrich@herberg.name URI: http://www.herberg.name/ Jiazi Yi LIX, Ecole Polytechnique 91128 Palaiseau Cedex, France Phone:+33-1-6933-4126+33 1 69 33 40 31 Email:ulrich@herberg.namejiazi@jiaziyi@com URI:http://www.herberg.name/http://www.jiaziyi.com/ Thomas Heide Clausen LIX, Ecole Polytechnique 91128 Palaiseau Cedex, France Phone: +33 6 6058 9349 Email: T.Clausen@computer.org URI: http://www.thomasclausen.org/