Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1080793.1080802acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Hotspot-based traceback for mobile ad hoc networks

Published: 02 September 2005 Publication History

Abstract

Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions such as trustworthy routers and static route topology that do not hold in the ad hoc platform. In this paper, we propose a single-packet traceback solution that is extended from the hash-based traceback scheme [19] but not relying on these assumptions. In particular, our solution is fully distributed and resilient in the face of arbitrary number of collaborative adversaries.In this paper, we develop a new technique, namely Tagged Bloom Filters, as an efficient means to store additional information associated with each incoming packet. The additional information can be used to accurately recover the attack path when an attack packet is queried in a traceback session. Based on this technique, we propose several distributed schemes, collectively called Hotspot-Based Traceback schemes, to defeat attacks under different security requirements. We present the protocol design, study possible security caveats and propose the corresponding countermeasures.We present both theoretical and experimental results using ns-2 [8] simulations to show the effectiveness and efficiency of our approach.

References

[1]
S. M. Bellovin. ICMP traceback messages. Internet draft draft-bellovin-itrace-00.txt, Network Working Group, Mar. 2000. expired 2000.]]
[2]
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'99), pages 216--233, London, UK, 1999. Springer-Verlag.]]
[3]
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of ACM, 13(7):422--426, July 1970.]]
[4]
H. Burch and B. Cheswick. Tracing anonymous packets to their approximate source. In Proceedings of the USENIX LISA Conference, Dec. 2000.]]
[5]
S. Capkun, L. Buttyán, and J.-P. Hubaux. Self-organized public-key management for mobile ad hoc networks. In Proceedings of the ACM International Workshop on Wireless Security (WiSe'02), 2002.]]
[6]
S. Capkun, J.-P. Hubaux, and L. Buttyán. Mobility helps security in ad hoc networks. In Proceedings of the Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03), 2003.]]
[7]
S. Cheung and K. N. Levitt. Protecting routing infrastructures from denial of service using cooperative intrusion detection. In Proceedings of the New Security Paradigms Workshop, Cumbria, UK, Sept. 1997.]]
[8]
K. Fall, K. Varadhan, and the VINT project. The ns Manual (formerly ns Notes and Documentation), 2000.]]
[9]
L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary cache: a scalable wide-area Web cache sharing protocol. IEEE/ACM Transactions on Networking, 8(3):281--293, 2000.]]
[10]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom'02), Sept. 2002.]]
[11]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE INFOCOM, pages 1976--1986, San Francisco, CA, Apr. 2003.]]
[12]
Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), Oct. 2003.]]
[13]
Y. Huang and W. Lee. Attack analysis and detection for ad hoc routing protocols. In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04), pages 125--145, French Riviera, France, Sept. 2004.]]
[14]
J.-P. Hubaux, L. Buttyán, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'01), Long Beach, CA, 2001.]]
[15]
D. Liu and P. Ning. Multilevel ≥TESLA: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 3(4):800--836, Nov. 2004.]]
[16]
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (Mobicom'00), pages 255--265, 2000.]]
[17]
C. E. Perkins, E. M. Belding-Royer, and I. Chakeres. Ad hoc on demand distance vector (AODV) routing. Internet draft draft-perkins-manet-aodvbis-00.txt, Internet Engineering Task Force, Oct. 2003. (Work in Progress).]]
[18]
S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Network support for IP traceback. ACM/IEEE Transactions on Networking, 9(3):226--239, June 2001.]]
[19]
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer. Hash-based IP traceback. In Proceedings of the ACM Conference on Communications Architectures, Protocols and Applications(SIGCOMM'01), 2001.]]
[20]
D. X. Song and A. Perrig. Advanced and authenticated marking schemes for IP traceback. In Proceedings of the IEEE INFOCOM, volume 2, 2001.]]
[21]
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. Security Protocols. 7th International Workshop Proceedings, Lecture Notes in Computer Science, pages 172--194, 1999.]]
[22]
N. H. Vaidya. Weak duplicate address detection in mobile ad hoc networks. In Proceeding of the Third ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), pages 206--216, Lausanne, Switzerland, June 2002.]]
[23]
X. Wang, D. S. Reeves, S. F. Wu, and J. Yuill. Sleepy watermark tracing: An active intrusion response framework. In Proceedings of the 16th International Information Security Conference (IFIP/Sec'01), June 2001.]]
[24]
A. Yaar, A. Perrig, and D. X. Song. FIT: Fast internet traceback. In Proceedings of IEEE INFOCOM, Miami, FL, Mar. 2005.]]

Cited By

View all

Index Terms

  1. Hotspot-based traceback for mobile ad hoc networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSe '05: Proceedings of the 4th ACM workshop on Wireless security
    September 2005
    116 pages
    ISBN:1595931422
    DOI:10.1145/1080793
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 September 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ad hoc networks
    2. intrusion response
    3. traceback

    Qualifiers

    • Article

    Conference

    WiSE05
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 10 of 41 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Mitigating DoS Attack in MANETs Considering Node Reputation with AIJournal of Network and Systems Management10.1007/s10922-023-09742-331:3Online publication date: 7-Jun-2023
    • (2014)A survey of the mitigation methods against DoS attacks on MANETs2014 Science and Information Conference10.1109/SAI.2014.6918239(538-544)Online publication date: Aug-2014
    • (2014)A practical approach for provenance transmission in wireless sensor networksAd Hoc Networks10.1016/j.adhoc.2013.12.00116(28-45)Online publication date: 1-May-2014
    • (2013)Survey Bloom filter applications in network securityComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2013.09.00357:18(4047-4064)Online publication date: 1-Dec-2013
    • (2012)An energy-efficient approach for provenance transmission in wireless sensor networks2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)10.1109/SECON.2012.6275769(130-138)Online publication date: Jun-2012
    • (2012)Hop-by-Hop Traceback in Wireless Sensor NetworksIEEE Communications Letters10.1109/LCOMM.2011.121311.11226516:2(242-245)Online publication date: Feb-2012
    • (2012)AK-PPMProceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses10.1007/978-3-642-33338-5_8(147-168)Online publication date: 12-Sep-2012
    • (2011)Energy-efficient provenance transmission in large-scale wireless sensor networksProceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks10.1109/WoWMoM.2011.5986127(1-6)Online publication date: 20-Jun-2011
    • (2011)Stable Topology Support for Tracing DDoS Attackers in MANET2011 IEEE Global Telecommunications Conference - GLOBECOM 201110.1109/GLOCOM.2011.6133795(1-6)Online publication date: Dec-2011
    • (2010)A hotspot-based protocol for attack traceback in mobile ad hoc networksProceedings of the 5th ACM Symposium on Information, Computer and Communications Security10.1145/1755688.1755733(333-336)Online publication date: 13-Apr-2010
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media