Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks

被引:1
|
作者
Yun, Ji-Hoon [1 ]
Park, Min-Ho [2 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Elect & Informat Engn, Seoul 139743, South Korea
[2] Soongsil Univ, Sch Elect Engn, Seoul, South Korea
关键词
Wireless ad hoc network; Wormhole attack; Relaying attack; WORMHOLE ATTACKS;
D O I
10.1007/s11277-013-1163-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
There have been many security protocols to provide authenticity and confidentiality in wireless ad hoc networks. However, they fail to defend networks against relaying attack in which attacker nodes simply broadcast received packets without compromising any legitimate nodes. Wormhole attack is a representative example of relaying attack, in which a pair of attacker nodes relay received packets to each other and selectively drop them. The wormhole attack is known to ruin routing and communication of a network considerably, however, is not very straightforward to be accomplished due to the pairwise nature. In this paper, we introduce two new types of relaying attack, called teleport and filtering attacks that require a single attacker node only for accomplishment. We describe their accomplishment conditions and impacts on the network performance in a formal manner. We then propose a countermeasure framework against these attacks called Single-Adversary Relaying Attack defense Mechanism (SARAM), which is composed of a bandwidth-efficient neighbor discovery customized for multi-hop environments and neighbor list management combined into an on-demand ad hoc routing protocol. SARAM does not require any special hardware such as location-aware equipments and tight synchronized clocks, thus is cost-efficient as well. We show via ns-2 simulation that the new relaying attacks deteriorate the network performance significantly and SARAM is effective and efficient in defending a network against these attacks.
引用
收藏
页码:2519 / 2532
页数:14
相关论文
共 50 条
  • [31] Wireless ad hoc networks
    Haas, ZJ
    Gerla, M
    Johnson, DB
    Perkins, CE
    Pursley, MB
    Steenstrup, M
    Toh, CK
    Hayes, JF
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1999, 17 (08) : 1329 - 1332
  • [32] A distributed strategic routing mechanism for wireless ad hoc networks
    Wu, MY
    Shu, W
    PROCEEDINGS OF THE IEEE 6TH CIRCUITS AND SYSTEMS SYMPOSIUM ON EMERGING TECHNOLOGIES: FRONTIERS OF MOBILE AND WIRELESS COMMUNICATION, VOLS 1 AND 2, 2004, : 17 - 20
  • [33] A novel handover mechanism for wireless mobile ad hoc networks
    Marwaha, S
    Tham, CK
    Srinivasan, D
    ICCS 2002: 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2002, : 1063 - 1067
  • [34] Designing incentive packet relaying strategies for wireless ad hoc networks with game theory
    Yan, Lu
    Hailes, Stephen
    WIRELESS SENSOR AND ACTOR NETWORKS II, 2008, 264 : 137 - 148
  • [35] DelPHI: Wormhole detection mechanism for ad hoc wireless networks
    Chiu, Hon Sun
    Lui, King-Shan
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 149 - +
  • [36] Multi-hop Decode-and-Forward Relaying in a Wireless Ad Hoc Networks
    Lee, Jaeyoung
    Shin, Hyundong
    Heo, Jun
    17TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2011), 2011, : 203 - 207
  • [37] Opportunistic Relaying in Wireless Ad Hoc Networks With Controllable Delay-Throughput Tradeoffs
    Chen, Moyuan
    Shi, Yi
    Dong, Xiaodai
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (08) : 3900 - 3916
  • [38] WODEM: Wormhole attack defense mechanism in wireless sensor networks
    Yun, Ji-Hoon
    Kim, Il-Hwan
    Lim, Jae-Han
    Seo, Seung-Woo
    UBIQUITOUS CONVERGENCE TECHNOLOGY, 2007, 4412 : 200 - +
  • [39] A mechanism for detection of gray hole attack in mobile ad hoc networks
    Sen, Jaydip
    Chandra, M. Girish
    Hariliara, S. G.
    Reddy, Harish
    Balamuralidhar, P.
    2007 6TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS & SIGNAL PROCESSING, VOLS 1-4, 2007, : 627 - 631
  • [40] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Poovendran, Radha
    Lazos, Loukas
    WIRELESS NETWORKS, 2007, 13 (01) : 27 - 59