Skip to main content

A Dynamic Timestamp Discrepancy against Replay Attacks in MANET

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 254))

Abstract

Mobile Ad hoc NETworks (MANETs), like traditional networks, are vulnerable to a wide range of Denial-of-Service (DoS) attacks. A Replay attack is one of them that degrade severely the MANET performance. A replay attacker performs this attack by interception and retransmission of the valid signed messages. The validation of signed messages is verified by a timestamp discrepancy fixed by sender and receiver nodes.

In this paper, we propose an enhancement of the timestamp concept, to avoid replay attack, characterized by two properties. The first is dynamic because it depends on the communication duration between sender and receiver nodes. The second is rigid because it estimates approximately the maximum date when the signed message should arrive to receive node.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Altman, E., Avrachenkov, K., Garnaev, A.: A Jamming Game in Wireless Networks with Transmission Cost. In: Chahed, T., Tuffin, B. (eds.) NET-COOP 2007. LNCS, vol. 4465, pp. 1–12. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  2. Xie, Y., Yu, S.: Monitoring the Application-Layer DDoS Attacks for Popular Websites. IEEE/ACM Trans. Networking 17(1), 15–25 (2009)

    Article  Google Scholar 

  3. Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In: Proceedings of MILCOM, pp. 1118–1123 (2002)

    Google Scholar 

  4. Chen, D., Deng, J., Varshney, P.K.: Protecting Wireless Networks Against a Denial of Service Attack Based on Virtual Jamming. In: ACM MobiCom 2003 Poster Session, San Diego, CA, USA, September 14-19 (2003)

    Google Scholar 

  5. Bellardo, J., Savage, S., Medina, D.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the USENIX Security Symposium, pp. 15–27 (2003)

    Google Scholar 

  6. Kyasanur, P., Vaidya, N.: Selfish MAC Layer Misbehavior in Wireless Networks. IEEE Transactions on Mobile Computing 4(5), 502–516 (2005)

    Article  Google Scholar 

  7. Gong, L., Syverson, P.: Fail-stop protocols: An Approach to Designing Secure Protocols. In: 5th International Working Conference on Dependable Computing for Critical Applicaitons, pp. 44–55 (September 1995)

    Google Scholar 

  8. Clausen, T., Jacquet, P.: RFC 3626: The Optimized Link-State Routing Protocol. Internet Engineering Task Force (IETF) Request For Comments (October 2003)

    Google Scholar 

  9. Wu, J., Chen, J., Wu, M.: A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless Mobile Network Security, ch.12. Springer, Heidelberg (2006)

    Google Scholar 

  10. Aad, I., Hubaux, J., Knightly, E.W.: Impact of Denial of Service Attacks on Ad hoc Networks. IEEE/ACM Trans. Networking 16(4), 791–802 (2008)

    Article  Google Scholar 

  11. Farooq, T., Jones, D.L., Merabti, M.: MAC Layer DoS Attacks in IEEE 802.11 Networks. In: The 11th Annual Conference on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2010), Liverpool, UK (2010)

    Google Scholar 

  12. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE standards 802.11 (January 1997)

    Google Scholar 

  13. Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM 21(12), 993–999 (1978)

    Article  MATH  Google Scholar 

  14. Denning, D.E., Sacco, G.M.: Timestamps in Key Distribution Protocols. Communications of the ACM 24(8), 533–536 (1981)

    Article  Google Scholar 

  15. Syverson, P.: A Taxonomy of Replay Attacks. In: Proceedings of the Computer Security Foundations Workshop (CSFW 1997), pp. 187–191 (June 1994)

    Google Scholar 

  16. Malladi, S., Foss, J.A., Heckendorn, R.B.: On Preventing Replay Attacks on Security Protocols. In: International Conference on Security and Management, pp. 77–83 (2002)

    Google Scholar 

  17. Macker, J.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. IETF RFC 2501 (January 1999)

    Google Scholar 

  18. Clausen, T.H., Adjih, C., Jacquet, P., Laouiti, A., Muhltahler, P., Raffo, D.: Securing the OLRS Protocol. In: Proceedings of IFIP Med-Hoc-Net (June 2003)

    Google Scholar 

  19. Hafslund, A., Tønnesen, A., Rotvik, R.B., Andersson, J., Kure, Ø.: Secure Extension to the OLSR protocol. In: OLSR Interop and Workshop (2004)

    Google Scholar 

  20. Raffo, D.: Security Schemes for the OLSR Protocol for Ad Hoc Networks. PhD Thesis, Universitè Paris 6 – INRIA Rocquencourt (2005)

    Google Scholar 

  21. Gross, D., Shortle, J.F., Thompson, J.M., Harris, C.M.: Fundamentals of Queueing Theory book, 4th edn. Wiley Series in Probability and Statistics (August 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Enneya, N., Baayer, A., ElKoutbi, M. (2011). A Dynamic Timestamp Discrepancy against Replay Attacks in MANET. In: Abd Manaf, A., Sahibuddin, S., Ahmad, R., Mohd Daud, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 254. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25483-3_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25483-3_40

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25482-6

  • Online ISBN: 978-3-642-25483-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics