Skip to main content

AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks

  • Conference paper
Research in Attacks, Intrusions, and Defenses (RAID 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7462))

Included in the following conference series:

Abstract

Packet traceback in mobile ad hoc networks (MANETs) is a technique for identifying the source and intermediaries of a packet forwarding path. While many IP traceback techniques have been introduced for packet attribution in the Internet, they are not directly applicable in MANETs due to unique challenges of MANET environments.

In this work, we make the first effort to quantitatively analyze the impacts of node mobility, attack packet rate, and path length on the traceability of two types of well-known IP traceback schemes: probabilistic packet marking (PPM) and hash-based logging. We then present the design of an authenticated K-sized Probabilistic Packet Marking (AK-PPM) scheme, which not only improves the effectiveness of source traceback in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve asymptotically one-hop precise, and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Snoeren, A.C., Kohno, T., Savage, S., Vahdat, A., Voelker, G.M.: Collaborative research: Nets-find: Privacy-preserving attribution and provenence. Technical report, University of California, San Diego and University of Washington (2010)

    Google Scholar 

  2. Hunker, J., Hutchinson, B., Margulies, J.: Role and challenges for sufficient cyber-attack attribution. Technical report, Instituite for Information Infrastructure Protection (2008)

    Google Scholar 

  3. Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. SIGCOMM Comput. Commun. Rev. 34, 39–53 (2004)

    Article  Google Scholar 

  4. Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: Proc. of Infocom (2004)

    Google Scholar 

  5. Wang, X., Govindan, K., Mohapatra, P.: Provenance-based information trustworthiness evaluation in multi-hop networks. In: Proc. of GLOBECOM 2010 (2010)

    Google Scholar 

  6. Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. ACM Trans. on Information and System Security 5, 119–137 (2002)

    Article  Google Scholar 

  7. Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Kent, S., Strayer, W.: Hash-Based IP traceback. In: Proc. of the ACM SIGCOMM, pp. 3–14 (2001)

    Google Scholar 

  8. Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: IEEE Infocom 2001, pp. 878–886 (2001)

    Google Scholar 

  9. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network support for IP traceback. ACM Trans. on Networking 9(3), 226–237 (2001)

    Article  Google Scholar 

  10. Sung, M., Xu, J., Li, J., Li, L.: Large-scale ip traceback in high-speed internet: practical techniques and information-theoretic foundation. IEEE/ACM Trans. Netw. 16, 1253–1266 (2008)

    Article  Google Scholar 

  11. Jeong, J., Guo, S., Gu, Y., He, T., Du, D.: TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks. In: ICDCS 2009, pp. 743–757 (2009)

    Google Scholar 

  12. Thing, V., Lee, H.: Ip traceback for wireless ad-hoc networks. In: Proc. of Vehicular Technology Conference, VTC 2004-Fall (2004)

    Google Scholar 

  13. an Huang, Y., Lee, W.: Hotspot-based traceback for mobile ad hoc networks. In: Proc. of WiSec 2005, pp. 43–54 (2005)

    Google Scholar 

  14. Kim, Y., Helmy, A.: SWAT: Small world-based attacker traceback in ad-hoc networks. In: Proc. of MobiQuitous 2005, pp. 85–96 (2005)

    Google Scholar 

  15. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the ACM Conference on Computer and Communications Security 2003, pp. 52–61 (2003)

    Google Scholar 

  16. Du, W., Deng, J., Han, Y., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of CCS 2003, pp. 42–51 (2003)

    Google Scholar 

  17. Blundo, C., Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  18. Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: a lightweight network access control protocol for ad hoc networks. J. of Ad Hoc Networks 4, 567–585 (2006)

    Article  Google Scholar 

  19. Sourcefire, Inc.: Snort, http://www.snort.org/

  20. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of MobiCom 2000, pp. 255–265 (2000)

    Google Scholar 

  21. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for ip traceback. SIGCOMM Comput. Commun. Rev. 30, 295–306 (2000)

    Article  Google Scholar 

  22. Sadagopan, N., Bai, F., Krishnamachari, B., Helmy, A.: Paths: analysis of path duration statistics and their impact on reactive manet routing protocols. In: Proc. of MobiHoc 2003, pp. 245–256 (2003)

    Google Scholar 

  23. Feller, W.: An Introduction to Probability Theory and Applications, 3rd edn., vol. 1. John Wiley & Sons Publishers, New York (1968); vol. 2, 2nd edn. (1971)

    MATH  Google Scholar 

  24. Kuzmanovic, A., Knightly, E.W.: Low-rate tcp-targeted denial of service attacks. In: Proc. of SIGCOMM 2003, pp. 75–86 (2003)

    Google Scholar 

  25. Adler, M.: Tradeoffs in probabilistic packet marking for IP traceback. In: Proc. of STOC 2002, pp. 407–418 (2002)

    Google Scholar 

  26. Goodrich, M.: Efficient packet marking for large-scale IP traceback. In: Proc. of the 9th ACM CCS Conference, pp. 117–126 (2002)

    Google Scholar 

  27. Ye, F., Yang, H., Liu, Z.: Catching ”moles” in sensor networks. In: Proc. of ICDCS 2007, p. 69 (2007)

    Google Scholar 

  28. Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ubiquitous computing. Computer, 22–26 (2002)

    Google Scholar 

  29. John, E., Kobza, S.H.J., Vaughan, D.E.: A survey of the coupon collectors problem with random sample sizes. Methodology and Comp. in Applied Probability 9, 1387–5841 (2007)

    MathSciNet  Google Scholar 

  30. Sellke, T.M.: How many iid samples does it take to see all the balls in a box? The Annals of Applied Probability 5, 294–309 (1995)

    Article  MathSciNet  Google Scholar 

  31. Zarai, F., Rekhis, S., Boudriga, N., Zidane, K.: Sdppm: An ip traceback scheme for manet. In: Proc. of ICECS 2005, pp. 1–4 (2005)

    Google Scholar 

  32. Kim, I.Y., Kim, K.C.: A resource-efficient ip traceback technique for mobile ad-hoc networks based on time-tagged bloom filter. In: Proc. of ICCIT 2008, pp. 549–554 (2008)

    Google Scholar 

  33. Hsu, H., Sencun Zhu, A.H.: A hotspot-based protocol for attack traceback in mobile ad hoc networks. In: Proc. of ASIACCS 2010, pp. 333–336 (2010)

    Google Scholar 

  34. Thomas, W., Doeppner, P.N., Klein, A.K.: Using router stamping to identify the source of ip packets. In: Proc. of CCS 2000, pp. 184–189 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, Z., Hsu, H., Chen, X., Zhu, S., Hurson, A.R. (2012). AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds) Research in Attacks, Intrusions, and Defenses. RAID 2012. Lecture Notes in Computer Science, vol 7462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33338-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33338-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33337-8

  • Online ISBN: 978-3-642-33338-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics