Advertisement

Wireless Networks

, Volume 25, Issue 4, pp 1669–1683 | Cite as

Active detection in mitigating routing misbehavior for MANETs

  • Cong PuEmail author
  • Sunho Lim
  • Jinseok Chae
  • Byungkwan Jung
Article

Abstract

Mobile ad hoc network (MANET) is vulnerable to security attacks because of the shared radio medium and lack of centralized coordination. Since most multi-hop routing protocols implicitly assume cooperative routing and are not originally designed for security attacks, MANET has been challenged by diverse denial-of-service attacks that often interfere with the protocol and interrupt on-going communication. In this paper, we propose an explore-based active detection scheme, called EBAD, to efficiently mitigate the routing misbehaviors in MANETs running with dynamic source routing. The basic idea is that a source node broadcasts a route request packet with a fictitious destination node to lure potential malicious nodes to reply a fake route reply packet. If the source node receives the fake route reply packet or an intermediate node cannot decrypt the received route reply packet, the routing misbehavior can be detected. We also propose a route expiry timer based approach to reduce the effect of route cache pollution because of the fake route reply. We present a simple analytical model of the EBAD and its numerical result in terms of detection rate. We also conduct extensive simulation experiments using the OMNeT++ for performance evaluation and comparison with the existing schemes, CBDS and 2ACK. The simulation results show that the proposed countermeasure can not only improve the detection rate and packet delivery ratio but also can reduce the energy consumption and detection latency.

Keywords

Denial-of-service (DoS) Dynamic source routing (DSR) Mobile ad hoc network (MANET) Routing misbehavior 

Notes

Acknowledgements

This research was supported in part by Startup grant in Division of Computer Science at Marshall University.

References

  1. 1.
    Loo, J., Mauri, J. L., & Ortiz, J. H. (2016). Mobile ad hoc networks: Current status and future trends. Boca Raton: CRC Press.Google Scholar
  2. 2.
    Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski, & H. F. Korth (Eds.), Mobile computing (pp. 153–181). Boston, MA: Springer.CrossRefGoogle Scholar
  3. 3.
    Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of ACM MOBICOM, pp. 255–265.Google Scholar
  4. 4.
    Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. In Proceedings of IEEE IPDPS, pp. 1–8.Google Scholar
  5. 5.
    Xiao, B., Yu, B., & Gao, C. (2007). CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11), 1218–1230.CrossRefzbMATHGoogle Scholar
  6. 6.
    Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRefGoogle Scholar
  7. 7.
    Shila, D. M., Yu, C., & Anjali, T. (2010). Mitigating selective forwarding attacks with a channel-aware approach in WMNs. IEEE Transactions on Wireless Communications, 9(5), 1661–1675.CrossRefGoogle Scholar
  8. 8.
    Liu, Q., Yin, J., Leung, V., & Cai, Z. (2013). FADE: Forwarding assessment based detection of collaborative grey hole attacks in WMNs. IEEE Transactions on Wireless Communications, 12(10), 5124–5137.CrossRefGoogle Scholar
  9. 9.
    Chae, Y., DiPippo, L. C., & Sun, Y. L. (2015). Trust management for defending on-off attacks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 1178–1191.CrossRefGoogle Scholar
  10. 10.
    Ren, J., Zhang, Y., Zhang, K., & Shen, X. S. (2014). Exploiting channel-aware reputation system against selective forwarding attacks in WSNs. In Proceedings of IEEE GLOBECOM, pp. 330–335.Google Scholar
  11. 11.
    Ren, J., Zhang, Y., Zhang, K., & Shen, X. (2016). Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(5), 3718–3731.CrossRefGoogle Scholar
  12. 12.
    Pu, C., & Lim, S. (2016). A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: Design, analysis, and evaluation. IEEE Systems Journal.  https://doi.org/10.1109/JSYST.2016.2535730.Google Scholar
  13. 13.
    Chang, J.-M., Tsou, P.-C., Woungang, I., Chao, H.-C., & Lai, C.-F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65–75.CrossRefGoogle Scholar
  14. 14.
    A. Varga. (2014). OMNeT++. http://www.omnetpp.org/.
  15. 15.
    Lim, S., & Lauren, H. (2015). Hop-by-hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks. In Proceedings of IEEE ICNC, pp. 315–319.Google Scholar
  16. 16.
    Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38.CrossRefGoogle Scholar
  17. 17.
    Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2002). The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(2), 2–13.Google Scholar
  18. 18.
    Dong, Y., Chim, T. W., Li, V. O., Yiu, S.-M., & Hui, C. (2009). ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Networks, 7(8), 1536–1550.CrossRefGoogle Scholar
  19. 19.
    Li, X., Li, H., Ma, J., & Zhang, W. (2009). An efficient anonymous routing protocol for mobile ad hoc networks. In Fifth international conference on information assurance and security, 2009 (IAS’09), vol. 2. IEEE, pp. 287–290.Google Scholar
  20. 20.
    Song, R., Korba, L., & Yee, G. (2005). AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks. ACM, pp. 33–42.Google Scholar
  21. 21.
    Pu, C., & Lim, S. (2015). Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks. In Proceedings of IEEE MILCOM, pp. 903–908.Google Scholar
  22. 22.
    Midi, D., & Bertino, E. (2016). Node or link? Fine-grained analysis of packet-loss attacks in wireless sensor networks. ACM Transactions on Sensor Networks, 12(2), 8.CrossRefGoogle Scholar
  23. 23.
    Zhang, Y., Lazos, L., & Kozma, W. (2016). AMD: Audit-based misbehavior detection in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 15(8), 1893–1907.CrossRefGoogle Scholar
  24. 24.
    Stehlik, M., Matyas, V., & Stetsko, A. (2016). Towards better selective forwarding and delay attacks detection in wireless sensor networks. In Proceedings of IEEE ICNSC, pp. 1–6.Google Scholar
  25. 25.
    Lim, S., Yu, C., & Das, C. R. (2009). RandomCast: An energy efficient communication scheme for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 8(3), 351–369.Google Scholar
  26. 26.
    Haghighi, A., Mizanian, K., & Mirjalily, G. (2015). Modified CBDS for defending against collaborative attacks by malicious nodes in MANETs. In 2nd international conference on KBEI. IEEE, pp. 902–907.Google Scholar
  27. 27.
    Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks, 7(6), 1097–1109.CrossRefGoogle Scholar
  28. 28.
    Stallings, W. (2013). Cryptography and network security—Principles and practices (6th ed.). Upper Saddle River: Prentice Hall.Google Scholar
  29. 29.
    Conti, M., Pietro Di, R., Mancini, L., & Mei, A. (2008). Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. In Proceedings of ACM wireless network security, pp. 214–219.Google Scholar
  30. 30.
    Reibel, J. (2002). An IP address configuration algorithm for zeroconf. mobile multi-hop ad-hoc networks. In Proceedings of the international workshop on broadband wireless ad-hoc networks and services. Citeseer, Sophia Antipolis.Google Scholar
  31. 31.
    Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.MathSciNetCrossRefzbMATHGoogle Scholar
  32. 32.
    Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE INFOCOM, pp. 1976–1986.Google Scholar
  33. 33.
    Chatterjee, P., Ghosh, U., Sengupta, I., & Ghosh, S. (2014). A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Networks, 20(7), 1669–1684.CrossRefGoogle Scholar
  34. 34.
    Li, X., Lu, R., Liang, X., & Shen, X. (2011). Side channel monitoring: Packet drop attack detection in wireless ad hoc networks. In Proceedings of IEEE ICC, pp. 1–5.Google Scholar
  35. 35.
    Marina, M. K., & Das, S. R. (2001). Performance of route caching strategies in dynamic source routing. In International workshop on wireless networks and mobile computing (WNMC), pp. 425–432.Google Scholar
  36. 36.
    Tang, X., & Xu, J. (2006). Extending network lifetime for precision-constrained data aggregation in wireless sensor networks. In Proceedings of IEEE INFOCOM, pp. 1–12.Google Scholar
  37. 37.
    Perkins, C., & Belding-Royer, E. (1999). Ad hoc on-demand distance vector routing. In Proceedings of WMCSA, pp. 90–100.Google Scholar
  38. 38.
    Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of SIGCOMM, pp. 234–244.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Division of Computer ScienceMarshall UniversityHuntingtonUSA
  2. 2.Department of Computer ScienceTexas Tech UniversityLubbockUSA
  3. 3.Department of Computer Science and EngineeringIncheon National UniversityIncheonKorea

Personalised recommendations