Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks

被引:0
|
作者
Chen, Ruiliang [1 ]
Snow, Michael [1 ]
Park, Jung-Min [1 ]
Refaei, M. Tamer [1 ]
Eltoweissy, Mohamed [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Lab Adv Res Informat Assurance & Secur ARIAS, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Denial-of-Service Attacks; Mobile Ad Hoc Networks; Routing Disruption Attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique that detects attacks at the transport layer but responds to attacks at the network layer. Because most routing disruption attacks cause a significant drop in end-to-end goodput, monitoring the goodput of a route at the transport layer can detect abnormalities in the network (e. g., node or link failures, DoS attacks, etc.). Once an abnormal event is detected, a route rebuilding process is initiated at the network layer to find a new route. Using analysis and simulation results, we show that the TUF architecture is effective in thwarting a wide range of attacks, including protocol-compliant (also known as "JellyFish") attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks
    Manikandan, K. P.
    Satyaprasad, R.
    Rajasekhararao, K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (03) : 7 - 12
  • [2] A Robust Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks
    Sun, Hung-Min
    Chen, Chiung-Shun
    Chen, Ci-Lun
    Chen, Yao-Hsin
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 58 - 65
  • [3] HADOF: Defense against routing disruptions in mobile ad hoc networks
    Yu, W
    Sun, Y
    Liu, KJR
    IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1252 - 1261
  • [4] Routing attacks and solutions in mobile ad hoc networks
    Geng Peng
    Zou Chuanyun
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 806 - +
  • [5] An Effective IDS Against Routing Attacks on Mobile Ad-Hoc Networks
    Meddeb, Rahma
    Triki, Bayrem
    Jmili, Farah
    Korbaa, Ouajdi
    NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES (SOMET_18), 2018, 303 : 201 - 214
  • [6] A survey of routing attacks in mobile Ad Hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Nemoto, Yoshiaki
    Kato, Nei
    Jamalipour, Abbas
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 85 - 91
  • [7] Attacks against AODV Routing Protocol in Mobile Ad-Hoc Networks
    Moudni, Houda
    Er-Rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 13TH INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, IMAGING AND VISUALIZATION (CGIV), 2016, : 385 - 389
  • [8] Defense against injecting traffic attacks in wireless mobile ad-hoc networks
    Yu, Wei
    Liu, K. J. Ray
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (02) : 227 - 239
  • [9] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250
  • [10] Security model for routing attacks in mobile ad hoc networks
    Alampalayam, SP
    Kumar, A
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2122 - 2126