Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks

被引:1
|
作者
Yun, Ji-Hoon [1 ]
Park, Min-Ho [2 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Elect & Informat Engn, Seoul 139743, South Korea
[2] Soongsil Univ, Sch Elect Engn, Seoul, South Korea
关键词
Wireless ad hoc network; Wormhole attack; Relaying attack; WORMHOLE ATTACKS;
D O I
10.1007/s11277-013-1163-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
There have been many security protocols to provide authenticity and confidentiality in wireless ad hoc networks. However, they fail to defend networks against relaying attack in which attacker nodes simply broadcast received packets without compromising any legitimate nodes. Wormhole attack is a representative example of relaying attack, in which a pair of attacker nodes relay received packets to each other and selectively drop them. The wormhole attack is known to ruin routing and communication of a network considerably, however, is not very straightforward to be accomplished due to the pairwise nature. In this paper, we introduce two new types of relaying attack, called teleport and filtering attacks that require a single attacker node only for accomplishment. We describe their accomplishment conditions and impacts on the network performance in a formal manner. We then propose a countermeasure framework against these attacks called Single-Adversary Relaying Attack defense Mechanism (SARAM), which is composed of a bandwidth-efficient neighbor discovery customized for multi-hop environments and neighbor list management combined into an on-demand ad hoc routing protocol. SARAM does not require any special hardware such as location-aware equipments and tight synchronized clocks, thus is cost-efficient as well. We show via ns-2 simulation that the new relaying attacks deteriorate the network performance significantly and SARAM is effective and efficient in defending a network against these attacks.
引用
收藏
页码:2519 / 2532
页数:14
相关论文
共 50 条
  • [1] Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
    Ji-Hoon Yun
    Min-Ho Park
    Wireless Personal Communications, 2013, 72 : 2519 - 2532
  • [2] Survey on sybil attack defense mechanisms in wireless ad hoc networks
    Vasudeva, Amol
    Sood, Manu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 120 : 78 - 118
  • [3] Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks
    Poongodi, T.
    Khan, Mohammed S.
    Patan, Rizwan
    Gandomi, Amir H.
    Balusamy, Balamurugan
    IEEE ACCESS, 2019, 7 : 18409 - 18419
  • [4] Probabilistic Packet Relaying in Wireless Mobile Ad Hoc Networks
    Seredynski, Marcin
    Ignac, Tomasz
    Bouvry, Pascal
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, PT I, 2010, 6067 : 31 - +
  • [5] Outage Probability of Wireless Ad Hoc Networks with Cooperative Relaying
    Mohammadi, Mohommadali
    Suraweera, Himal A.
    Zhou, Xiangyun
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 4410 - 4416
  • [6] Port Change Attack in Wireless Ad Hoc Networks
    Vishnu, K.
    Jain, Mohit
    Jain, Shalini
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 146 - 148
  • [7] Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks
    Kim, Hyojin
    Chitti, Ramachandra Bhargav
    Song, JooSeok
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (02) : 579 - 582
  • [8] Game theoretic packet relaying model for wireless ad hoc networks
    Yan, Lu
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (01) : 68 - 89
  • [9] Increasing attack resiliency of wireless ad hoc and sensor networks
    Vogt, H
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 179 - 184
  • [10] Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
    Tamilselvan, Latha
    Sankaranarayanan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 118 - 123