Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks

被引:0
|
作者
Chen, Ruiliang [1 ]
Snow, Michael [1 ]
Park, Jung-Min [1 ]
Refaei, M. Tamer [1 ]
Eltoweissy, Mohamed [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Lab Adv Res Informat Assurance & Secur ARIAS, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Denial-of-Service Attacks; Mobile Ad Hoc Networks; Routing Disruption Attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique that detects attacks at the transport layer but responds to attacks at the network layer. Because most routing disruption attacks cause a significant drop in end-to-end goodput, monitoring the goodput of a route at the transport layer can detect abnormalities in the network (e. g., node or link failures, DoS attacks, etc.). Once an abnormal event is detected, a route rebuilding process is initiated at the network layer to find a new route. Using analysis and simulation results, we show that the TUF architecture is effective in thwarting a wide range of attacks, including protocol-compliant (also known as "JellyFish") attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A secure and resistant architecture against attacks for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 150 - 166
  • [22] Research on the detection and defense systems against DDoS attacks in ad hoc networks
    Jing, Huang
    Wen, Wushao
    INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1161 - 1167
  • [23] A survey of Attacks in Mobile Ad hoc Networks
    Meddeb, Rahma
    Triki, Bayrem
    Jemili, Arah
    Korbaa, Ouajdi
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [24] Interlayer attacks in mobile ad hoc networks
    Guang, Lei
    Assi, Chadi
    Benslimane, Abderrahim
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 436 - +
  • [25] Classification of Mobile Ad Hoc Networks Attacks
    Sbai, Oussama
    Elboukhari, Mohamed
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 618 - 624
  • [26] An enhanced detection system against routing attacks in mobile ad-hoc network
    Mahendra Prasad
    Sachin Tripathi
    Keshav Dahal
    Wireless Networks, 2022, 28 : 1411 - 1428
  • [27] Swarm Based Architecture for Defense Against Stealthy Attacks in Mobile Ad Hoc Network
    Ranjan, Abhishek
    Kuthadi, Venu Madhav
    Marwala, Tshilidzi
    Selvaraj, Rajalakshmi
    AD HOC & SENSOR WIRELESS NETWORKS, 2017, 36 (1-4) : 107 - 126
  • [28] An enhanced detection system against routing attacks in mobile ad-hoc network
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    WIRELESS NETWORKS, 2022, 28 (04) : 1411 - 1428
  • [29] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [30] A Multipath Routing for Mobile Ad Hoc Networks
    Zheng Sihai
    Li Layuan
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL III, 2010, : 355 - 358