Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks

被引:0
|
作者
Chen, Ruiliang [1 ]
Snow, Michael [1 ]
Park, Jung-Min [1 ]
Refaei, M. Tamer [1 ]
Eltoweissy, Mohamed [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Lab Adv Res Informat Assurance & Secur ARIAS, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
Denial-of-Service Attacks; Mobile Ad Hoc Networks; Routing Disruption Attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique that detects attacks at the transport layer but responds to attacks at the network layer. Because most routing disruption attacks cause a significant drop in end-to-end goodput, monitoring the goodput of a route at the transport layer can detect abnormalities in the network (e. g., node or link failures, DoS attacks, etc.). Once an abnormal event is detected, a route rebuilding process is initiated at the network layer to find a new route. Using analysis and simulation results, we show that the TUF architecture is effective in thwarting a wide range of attacks, including protocol-compliant (also known as "JellyFish") attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A Multipath Routing for Mobile Ad Hoc Networks
    Zheng, Sihai
    Li, Layuan
    APPLIED INFORMATICS AND COMMUNICATION, PT III, 2011, 226 : 608 - 614
  • [42] Multicast routing in mobile ad hoc networks
    Moustafa, H
    Labiod, H
    TELECOMMUNICATION SYSTEMS, 2004, 25 (1-2) : 65 - 88
  • [43] Routing in mobile and wireless ad hoc networks
    Boukerche, A
    Notare, MSMA
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2003, 63 (02) : 107 - 109
  • [44] Routing and security in mobile ad hoc networks
    Milanovic, N
    Malek, M
    Davidson, A
    Milutinovic, V
    COMPUTER, 2004, 37 (02) : 61 - +
  • [45] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [46] A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks
    Lakshmi, G. Vidhya
    Vaishnavi, P.
    JOURNAL OF ENGINEERING RESEARCH, 2024, 12 (03): : 379 - 386
  • [47] Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks
    Gripsy, J. Viji
    Kanchana, K. R.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (02) : 92 - 98
  • [48] Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
    Durresi, A
    Paruchuri, V
    Durresi, M
    Barolli, L
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 238 - 247
  • [49] Securing Data Forwarding against Blackhole Attacks in Mobile Ad Hoc Networks
    Elmahdi, Elbasher
    Yoo, Seong-Moo
    Sharshembiev, Kumar
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 463 - 467
  • [50] Secure cooperative mobile ad hoc networks against injecting traffic attacks
    Yu, W
    Liu, KJR
    2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 55 - 64