Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1062689.1062722acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
Article

A secure ad-hoc routing approach using localized self-healing communities

Published: 25 May 2005 Publication History

Abstract

Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protocol compliant. For instance, since packet loss is common in mobile wireless networks, the adversary can exploit this fact by hiding its malicious intents using compliant packet losses that appear to be caused by environmental reasons.In this paper we study two routing attacks that use non-cooperative network members and disguised packet losses to deplete ad hoc network resources and to reduce ad hoc routing performance. These two routing attacks have not been fully addressed in previous research. We propose the design of "self-healing community" to counter these two attacks. Our design exploits the redundancy in deployment which is typical of most ad hoc networks; Namely, it counters non-cooperative attacks using the probabilistic presence of nearby cooperative network members.To realize the new paradigm, we devise localized simple schemes to (re-)configure self-healing communities in spite of random node mobility. We develop a general analytic model to prove the effectiveness of our design. Then we implement our secure ad hoc routing protocols in simulation to verify the cost and overhead incurred by maintaining the communities. Our study confirms that the community-based security is a cost-effective strategy to make off-the-shelf ad hoc routing protocols secure.

References

[1]
I. Aad, J.-P. Hubaux, and E. W. Knightly. Denial of Service Resilience in Ad Hoc Networks. In ACM MOBICOM, pages 202--215, 2004.]]
[2]
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In First ACM Workshop on Wireless Security (WiSe), pages 21--30, 2002.]]
[3]
C. Bettstetter. Mobility Modeling in Wireless Networks: Categorization, Smooth Movement, and Border Effects. ACM Mobile Computing and Communication Review, 5(3):55--67, 2001.]]
[4]
C. Bettstetter, H. Hartenstein, and X. Perez-Costa. Stochastic Properties of the Random Waypoint Mobility Model. ACM/Kluwer Wireless Networks, Special Issue on Modeling and Analysis of Mobile Networks, 10(5):555--567, 2004.]]
[5]
C. Bettstetter and C. Wagner. The Spatial Node Distribution of the Random Waypoint Mobility Model. In German Workshop on Mobile Ad Hoc Networks (WMAN), pages 41--58, 2002.]]
[6]
S. Brands and D. Chaum. Distance-Bounding Protocols (Extended Abstract). In T. Helleseth, editor, EUROCRYPT'93, Lecture Notes in Computer Science 765, pages 344--359, 1993.]]
[7]
N. Cressie. Statistics for Spatial Data. John Wiley and Sons, 1993.]]
[8]
J. Deng, R. Han, and S. Mishra. Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks. In IEEE International Conference on Dependable Systems and Networks (DSN), pages 594--603, 2004.]]
[9]
J. Douceur. The Sybil Attack. In Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002), 2002.]]
[10]
L. M. Feeney and M. Nilsson. Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In IEEE INFOCOM, 2001.]]
[11]
L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Network and Distributed System Security Symposium (NDSS), 2004.]]
[12]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In ACM MOBICOM, pages 12--23, 2002.]]
[13]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In IEEE INFOCOM, 2003.]]
[14]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In ACM WiSe'03 in conjunction with MOBICOM'03, pages 30--40, 2003.]]
[15]
D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. Korth, editors, Mobile Computing, volume 353, pages 153--181. Kluwer Academic Publishers, 1996.]]
[16]
D. B. Johnson and D. A. Maltz. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), April 2003.]]
[17]
J. Kong, X. Hong, J.-S. Park, Y. Yi, and M. Gerla. L'Hospital: Self-healing Secure Routing for Mobile Ad-hoc Networks. Technical Report CSD-TR040055, Dept. of Computer Science, UCLA, January 2005.]]
[18]
M. K. Marina and S. R. Das. Ad Hoc On-demand Multipath Distance Vector Routing. In IEEE ICNP, pages 14--23, 2001.]]
[19]
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In ACM MOBICOM, 2000.]]
[20]
P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad Hoc Networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), 2002.]]
[21]
P. Papadimitratos and Z. J. Haas. Secure Data Transmission in Mobile Ad Hoc Networks. In Second ACM Workshop on Wireless Security (WiSe), pages 41--50, 2003.]]
[22]
C. E. Perkins and E. M. Royer. Ad-Hoc On-Demand Distance Vector Routing. In IEEE WMCSA'99, pages 90--100, 1999.]]
[23]
C. E. Perkins, E. M. Royer, and S. Das. Ad-hoc On Demand Distance Vector (AODV) Routing. http://www.ietf.org/rfc/rfc3561.txt, July 2003.]]
[24]
A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5(2):2--13, 2002.]]
[25]
G. Resta and P. Santi. An Analysis of the Node Spatial Distribution of the Random Waypoint Model for Ad Hoc Networks. In ACM Workshop on Principles of Mobile Computing (POMC), pages 44--50, 2002.]]
[26]
P. Sambasivam, A. Murthy, and E. M. Belding-Royer. Dynamically Adaptive Multipath Routing based on AODV. In Med-Hoc-Net, 2004.]]
[27]
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. Royer. A Secure Routing Protocol for Ad Hoc Networks. In 10th International Conference on Network Protocols (IEEE ICNP'02), 2002.]]
[28]
Scalable Network Technologies (SNT). QualNet. http://www.qualnet.com/.]]
[29]
C. Sengul and R. Kravets. Bypass Routing: An On-Demand Local Recovery Protocol for Ad Hoc Networks. In Med-Hoc-Net, 2004.]]
[30]
E. Shih, P. Bahl, and M. Sinclair. Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices. In ACM MOBICOM, pages 160--171, 2002.]]
[31]
S. Čapkun, L. Buttyán, and J.-P. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pages 21--32, 2003.]]
[32]
J. Yoon, M. Liu, and B. Noble. Sound Mobility Models. In ACM MOBICOM, pages 205--216, 2003.]]
[33]
M. G. Zapata and N. Asokan. Securing Ad Hoc Routing Protocols. In First ACM Workshop on Wireless Security (WiSe), pages 1--10, 2002.]]

Cited By

View all
  • (2020)Improving AODV Routing Protocol for Image Transmission Over Mobile Video Sensor NetworksIEEE Access10.1109/ACCESS.2020.30240938(169396-169407)Online publication date: 2020
  • (2017)Comprehensive Evaluation of the Localized Certificate Revocation in Mobile Ad Hoc NetworkWireless Personal Communications: An International Journal10.1007/s11277-016-3661-694:3(977-1001)Online publication date: 1-Jun-2017
  • (2017)Energy efficient secured routing protocol for MANETsWireless Networks10.1007/s11276-015-1176-923:4(1001-1009)Online publication date: 1-May-2017
  • Show More Cited By

Index Terms

  1. A secure ad-hoc routing approach using localized self-healing communities

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
    May 2005
    470 pages
    ISBN:1595930043
    DOI:10.1145/1062689
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 May 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. community-based security
    2. self-healing ad hoc routing

    Qualifiers

    • Article

    Conference

    MobiHoc05
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 296 of 1,843 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Improving AODV Routing Protocol for Image Transmission Over Mobile Video Sensor NetworksIEEE Access10.1109/ACCESS.2020.30240938(169396-169407)Online publication date: 2020
    • (2017)Comprehensive Evaluation of the Localized Certificate Revocation in Mobile Ad Hoc NetworkWireless Personal Communications: An International Journal10.1007/s11277-016-3661-694:3(977-1001)Online publication date: 1-Jun-2017
    • (2017)Energy efficient secured routing protocol for MANETsWireless Networks10.1007/s11276-015-1176-923:4(1001-1009)Online publication date: 1-May-2017
    • (2016)Survey of secure routing protocols in MANETInternational Journal of Mobile Network Design and Innovation10.1504/IJMNDI.2016.0789996:3(142-155)Online publication date: 1-Jan-2016
    • (2016)Towards Secure Localized Certificate Revocation in Mobile Ad-Hoc NetworksIETE Technical Review10.1080/02564602.2016.121527034:5(561-571)Online publication date: 7-Sep-2016
    • (2015)An IDS-based Self-healing Approach for MANET SurvivalProceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication10.1145/2816839.2816840(1-5)Online publication date: 23-Nov-2015
    • (2015)Certificate revocation in MANET using clustering2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO)10.1109/ISCO.2015.7282359(1-3)Online publication date: Jan-2015
    • (2014)IntroductionIntrusion Detection in Wireless Ad-Hoc Networks10.1201/b16394-2(1-42)Online publication date: 9-Jan-2014
    • (2013)Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc NetworksIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2012.8524:2(239-249)Online publication date: 1-Feb-2013
    • (2013)A Survey of Geographical Routing in Wireless Ad-Hoc NetworksIEEE Communications Surveys & Tutorials10.1109/SURV.2012.062612.0010915:2(621-653)Online publication date: Oct-2014
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media