Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks

被引:0
|
作者
Chen, Ruiliang [1 ]
Snow, Michael [1 ]
Park, Jung-Min [1 ]
Refaei, M. Tamer [1 ]
Eltoweissy, Mohamed [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Lab Adv Res Informat Assurance & Secur ARIAS, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Denial-of-Service Attacks; Mobile Ad Hoc Networks; Routing Disruption Attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique that detects attacks at the transport layer but responds to attacks at the network layer. Because most routing disruption attacks cause a significant drop in end-to-end goodput, monitoring the goodput of a route at the transport layer can detect abnormalities in the network (e. g., node or link failures, DoS attacks, etc.). Once an abnormal event is detected, a route rebuilding process is initiated at the network layer to find a new route. Using analysis and simulation results, we show that the TUF architecture is effective in thwarting a wide range of attacks, including protocol-compliant (also known as "JellyFish") attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Aisle Routing for mobile ad hoc networks
    Zhang, Yikun
    Brown, Timothy X.
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2705 - 2710
  • [32] Hierarchical routing in ad hoc mobile networks
    Belding-Royer, EM
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05): : 515 - 532
  • [33] Optimized Routing in Mobile Ad hoc Networks
    Kumar, Rakesh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (12): : 85 - 91
  • [34] Multipath routing for mobile ad hoc networks
    Wu, K
    Harms, J
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2002, 4 (01) : 48 - 58
  • [35] Routing in Mobile Phone Ad Hoc Networks
    Kamkuemah, Martha
    Le, Hanh
    2013 FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2013, : 316 - 321
  • [36] Adaptive routing for mobile ad hoc networks
    Jeroen Hoebeke
    Ingrid Moerman
    Piet Demeester
    EURASIP Journal on Wireless Communications and Networking, 2012
  • [37] Multicast Routing in Mobile Ad Hoc Networks
    Hasnaa Moustafa
    Houda Labiod
    Telecommunication Systems, 2004, 25 : 65 - 88
  • [38] Adaptive routing for mobile ad hoc networks
    Hoebeke, Jeroen
    Moerman, Ingrid
    Demeester, Piet
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [39] QoS routing for mobile ad hoc networks
    Zhu, CX
    Corson, MS
    IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 958 - 967
  • [40] NOMAD - A MOBILE AD HOC AND DISRUPTION TOLERANT ROUTING PROTOCOL FOR TACTICAL MILITARY NETWORKS
    Holliday, Peter
    ICDCS: 2009 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2009, : 488 - 492