Skip to main content
Erschienen in: Wireless Personal Communications 4/2013

01.10.2013

Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks

verfasst von: Ji-Hoon Yun, Min-Ho Park

Erschienen in: Wireless Personal Communications | Ausgabe 4/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

There have been many security protocols to provide authenticity and confidentiality in wireless ad hoc networks. However, they fail to defend networks against relaying attack in which attacker nodes simply broadcast received packets without compromising any legitimate nodes. Wormhole attack is a representative example of relaying attack, in which a pair of attacker nodes relay received packets to each other and selectively drop them. The wormhole attack is known to ruin routing and communication of a network considerably, however, is not very straightforward to be accomplished due to the pairwise nature. In this paper, we introduce two new types of relaying attack, called teleport and filtering attacks that require a single attacker node only for accomplishment. We describe their accomplishment conditions and impacts on the network performance in a formal manner. We then propose a countermeasure framework against these attacks called Single-Adversary Relaying Attack defense Mechanism (SARAM), which is composed of a bandwidth-efficient neighbor discovery customized for multi-hop environments and neighbor list management combined into an on-demand ad hoc routing protocol. SARAM does not require any special hardware such as location-aware equipments and tight synchronized clocks, thus is cost-efficient as well. We show via ns-2 simulation that the new relaying attacks deteriorate the network performance significantly and SARAM is effective and efficient in defending a network against these attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
It is well known in the literature that, generally, on-demand routing protocols outperform other types of ad hoc routing protocols such as proactive (e.g., DSDV [7]). AODV [8] is the most well-known on-demand routing protocol.
 
Literatur
1.
Zurück zum Zitat Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 370–380.CrossRef Hu, Y. C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 370–380.CrossRef
2.
Zurück zum Zitat Nait-Abdesselam, F., et al. (2008). Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Communications Magazine, 46(4), 127–133.CrossRef Nait-Abdesselam, F., et al. (2008). Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Communications Magazine, 46(4), 127–133.CrossRef
3.
Zurück zum Zitat Khabbazian, M., et al. (2009). Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 736–745.CrossRef Khabbazian, M., et al. (2009). Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 736–745.CrossRef
4.
Zurück zum Zitat Ren, Y., et al. (2010). Detecting wormhole attacks in delay-tolerant networks. IEEE Wireless Communications, 17(5), 36–42.CrossRef Ren, Y., et al. (2010). Detecting wormhole attacks in delay-tolerant networks. IEEE Wireless Communications, 17(5), 36–42.CrossRef
5.
Zurück zum Zitat Zhang, R., & Zhang, Y. (2010). Wormhole-resilient secure neighbor discovery in underwater acoustic networks. IEEE INFOCOM. Zhang, R., & Zhang, Y. (2010). Wormhole-resilient secure neighbor discovery in underwater acoustic networks. IEEE INFOCOM.
6.
Zurück zum Zitat Hu, L., Evans, D. Using directional antennas to prevent wormhole attacks. Department of Computer Science University of Virginia Charlottesville, VA. Hu, L., Evans, D. Using directional antennas to prevent wormhole attacks. Department of Computer Science University of Virginia Charlottesville, VA.
7.
Zurück zum Zitat Perkins, C. E. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM’94 conference on communications architectures, protocols and applications. Perkins, C. E. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM’94 conference on communications architectures, protocols and applications.
8.
Zurück zum Zitat Perkins, C. E. (2003, July). Ad hoc on-demand distance vector (AODV) routing. RFC 3561, IETF. Perkins, C. E. (2003, July). Ad hoc on-demand distance vector (AODV) routing. RFC 3561, IETF.
10.
Zurück zum Zitat Broch, J., et al. (1998). A performance comparison of multi-hop wireless ad hoc network routing protocols. In Mobile computing and networking. Broch, J., et al. (1998). A performance comparison of multi-hop wireless ad hoc network routing protocols. In Mobile computing and networking.
11.
Zurück zum Zitat Douceur, J. R. (2002, March). The sybil attack. In 1st International workshop on peer-to-peer systems (IPTPS ’02). Douceur, J. R. (2002, March). The sybil attack. In 1st International workshop on peer-to-peer systems (IPTPS ’02).
12.
Zurück zum Zitat Karlof, C., et al. (2003, May). Secure routing in wireless sensor networks: Attacks and countermeasures. In IEEE international workshop on network protocols and applications (pp. 113–127). Karlof, C., et al. (2003, May). Secure routing in wireless sensor networks: Attacks and countermeasures. In IEEE international workshop on network protocols and applications (pp. 113–127).
13.
Zurück zum Zitat Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), 70–75.CrossRef Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10), 70–75.CrossRef
Metadaten
Titel
Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
verfasst von
Ji-Hoon Yun
Min-Ho Park
Publikationsdatum
01.10.2013
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2013
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-013-1163-3

Weitere Artikel der Ausgabe 4/2013

Wireless Personal Communications 4/2013 Zur Ausgabe

Neuer Inhalt