Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2988287.2989146acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Neighbor Contamination to Achieve Complete Bottleneck Control

Published: 13 November 2016 Publication History

Abstract

Black-holes, gray-holes and, wormholes, are devastating to the correct operation of any network. These attacks (among others) are based on the premise that packets will travel through compromised nodes, and methods exist to coax routing into these traps. Detection of these attacks are mainly centered around finding the subversion in action. In networks, bottleneck nodes -- those that sit on many potential routes between sender and receiver -- are an optimal location for compromise. Finding naturally occurring path bottlenecks, however, does not entitle network subversion, and as such are more difficult to detect. The dynamic nature of mobile ad-hoc networks (manets) causes ubiquitous routing algorithms to be even more susceptible to this class of attacks. Finding perceived bottlenecks in an olsr based manet, is able to capture between 50%-75% of data. In this paper we propose a method of subtly expanding perceived bottlenecks into complete bottlenecks, raising capture rate up to 99%; albeit, at high cost. We further tune the method to reduce cost, and measure the corresponding capture rate.

References

[1]
The ns-3 simulator. http://www.nsnam.org.
[2]
Mohammad Al-Shurman, Seong-Moo Yoo, and Seungjin Park. Black hole attack in mobile ad hoc networks. In Proceedings of the 42Nd Annual Southeast Regional Conference, ACM-SE 42, pages 96--97, New York, NY, USA, 2004. ACM.
[3]
Yih chun Hu, Adrian Perrig, and David B. Johnson. Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24:370--380, 2006.
[4]
T. Clausen and P. Jacquet. Optimized Link State Routing Protocol (OLSR). RFC 3626 (Experimental), October 2003. {Online}. Available: http://www.ietf.org/rfc/rfc3626.txt. (Access Date: 6 September 2012).
[5]
Hongmei Deng, W. Li, and D.P. Agrawal. Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10):70--75, Oct 2002.
[6]
Lester R Ford and Delbert R Fulkerson. Maximal flow through a network. Canadian Journal of Mathematics, 8(3):399--404, 1956.
[7]
Linton C Freeman, Stephen P Borgatti, and Douglas R White. Centrality in valued graphs: A measure of betweenness based on network flow. Social networks, 13(2):141--154, 1991.
[8]
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, and Jens Tölle. Detecting black hole attacks in tactical manets using topology graphs. In LCN, pages 1043--1052. IEEE Computer Society, 2007. 9} Haosong Gou and Younghwan Yoo. Distributed bottleneck node detection in wireless sensor network. In Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, pages 218--224, June 2010.
[9]
Yih-Chun Hu, A. Perrig, and D.B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pages 1976--1986 vol.3, March 2003.
[10]
P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized link state routing protocol for ad hoc networks. In Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings. IEEE international, pages 62--68, 2001.
[11]
Wenjing Lou. Spread: Enhancing data confidentiality in mobile ad hoc networks. In Proceedings IEEE INFOCOM, pages 2404--2413, 2004.
[12]
N. Schweitzer, A. Stulman, T. Hirst, R.D. Margalit, M. Armon, and A. Shabtai. Detecting bottlenecks on-the-fly in olsr based manets. In Electrical Electronics Engineers in Israel (IEEEI), 2014 IEEE 28th Convention of, pages 1--5, Dec 2014.
[13]
Mechthild Stoer and Frank Wagner. A simple min-cut algorithm. J. ACM, 44(4):585--591, July 1997.
[14]
Ariel Stulman, Jonathan Lahav, and Avraham Shmueli. Spraying diffie-hellman for secure key exchange in manets. In Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, and Joseph Bonneau, editors, Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, pages 202--212. Springer, 2013.
[15]
Srdjan Čapkun, Levente Buttyán, and Jean-Pierre Hubaux. Sector: Secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN '03, pages 21--32, New York, NY, USA, 2003. ACM.
[16]
Weichao Wang, Bharat Bhargava, Yi Lu, and Xiaoxin Wu. Defending against wormhole attacks in mobile ad hoc networks: Research articles. Wirel. Commun. Mob. Comput., 6(4):483--503, June 2006.

Cited By

View all

Index Terms

  1. Neighbor Contamination to Achieve Complete Bottleneck Control

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MSWiM '16: Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
    November 2016
    370 pages
    ISBN:9781450345026
    DOI:10.1145/2988287
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 November 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. internet of things
    2. manet
    3. mobile
    4. network bottlenecks
    5. wormhole

    Qualifiers

    • Research-article

    Conference

    MSWiM '16
    Sponsor:

    Acceptance Rates

    MSWiM '16 Paper Acceptance Rate 36 of 138 submissions, 26%;
    Overall Acceptance Rate 398 of 1,577 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media