Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks

被引:1
|
作者
Yun, Ji-Hoon [1 ]
Park, Min-Ho [2 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Elect & Informat Engn, Seoul 139743, South Korea
[2] Soongsil Univ, Sch Elect Engn, Seoul, South Korea
关键词
Wireless ad hoc network; Wormhole attack; Relaying attack; WORMHOLE ATTACKS;
D O I
10.1007/s11277-013-1163-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
There have been many security protocols to provide authenticity and confidentiality in wireless ad hoc networks. However, they fail to defend networks against relaying attack in which attacker nodes simply broadcast received packets without compromising any legitimate nodes. Wormhole attack is a representative example of relaying attack, in which a pair of attacker nodes relay received packets to each other and selectively drop them. The wormhole attack is known to ruin routing and communication of a network considerably, however, is not very straightforward to be accomplished due to the pairwise nature. In this paper, we introduce two new types of relaying attack, called teleport and filtering attacks that require a single attacker node only for accomplishment. We describe their accomplishment conditions and impacts on the network performance in a formal manner. We then propose a countermeasure framework against these attacks called Single-Adversary Relaying Attack defense Mechanism (SARAM), which is composed of a bandwidth-efficient neighbor discovery customized for multi-hop environments and neighbor list management combined into an on-demand ad hoc routing protocol. SARAM does not require any special hardware such as location-aware equipments and tight synchronized clocks, thus is cost-efficient as well. We show via ns-2 simulation that the new relaying attacks deteriorate the network performance significantly and SARAM is effective and efficient in defending a network against these attacks.
引用
收藏
页码:2519 / 2532
页数:14
相关论文
共 50 条
  • [41] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Radha Poovendran
    Loukas Lazos
    Wireless Networks, 2007, 13 : 27 - 59
  • [42] Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 30 - +
  • [43] Signal Strength Based Sybil Attack Detection in Wireless Ad hoc Networks
    Abbas, S.
    Merabti, M.
    Llewellyn-Jones, D.
    2009 SECOND INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2009), 2009, : 190 - 195
  • [44] Adversary immune leader election in ad hoc radio networks
    Kutylowski, M
    Rutkowski, W
    ALGORITHMS - ESA 2003, PROCEEDINGS, 2003, 2832 : 397 - 408
  • [45] Impact of mobility on the performance of relaying in ad hoc networks
    Al-Hanbali, A.
    Kherani, A. A.
    Groenevelt, R.
    Nain, P.
    Altman, E.
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 997 - +
  • [46] Relaying Algorithms with ARQ in Flying Ad hoc Networks
    Vasiliev, Danil S.
    Abilov, Albert
    2015 INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS (SIBCON), 2015,
  • [47] Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying
    Yao, Jianping
    Feng, Suili
    Zhou, Xiangyun
    Liu, Yuan
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (02) : 753 - 764
  • [48] Overlay networks for wireless ad hoc networks
    Scheideler, Christian
    WIRELESS COMMUNICATIONS, 2007, 143 : 237 - 258
  • [49] Power management mechanism for routing in ad-hoc wireless networks
    Zabian, Arwa
    MOBILE COMPUTING AND WIRELESS COMMUNICATION INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 63 - 68
  • [50] ECS: An enhanced carrier sensing mechanism for wireless ad hoc networks
    Li, ZF
    Nandi, S
    Gupta, AK
    COMPUTER COMMUNICATIONS, 2005, 28 (17) : 1970 - 1984