Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1280940.1280995acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
Article

On identifying malicious nodes in ad hoc networks

Published: 12 August 2007 Publication History

Abstract

Route falsification attacks are easy to launch in mobile ad hoc networks with on demand routing protocols that employ network-wide flooding of control packets for route discoveries. To mitigate this attack, we propose a p-hop crosscheck mechanism that requires nodes p, p ≥ 2, hops apart to authenticate and verify route reply packets using pair-wise shared keys. The crosscheck can detect route falsification by non-colluding malicious nodes on-the-fly; furthermore, it can identify a group of at most p+1 nodes that contain the malicious nodes that caused the route falsification. Unlike intrusion detection techniques, which require extensive monitoring and sampling, the proposed crosscheck mechanism is light-weight and fast. Therefore, the proposed crosscheck mechanism can be used to augment the existing secure routing protocols and improve intrusion detection capability. We implemented 2-hop crosscheck for AODV in the Glomosim simulator. Using simulations, we show that 2-hop crosscheck mitigates attacks by multiple malicious nodes with negligible performance impact.

References

[1]
G. Ács, L. Buttyán, and I. Vajda. Provable security of on-demand distance vector routing in wireless ad hoc networks. In Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS), 2005.
[2]
G. Ács, L. Buttyán, and I. Vajda. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 5(11):1533--1546, 2006.
[3]
R. Bagrodia et al. Glomosim: A scalable network simulation environment, v2.03. Parallel Computing Lab, UC Los Angeles, CA, December 2000.
[4]
R. Blom. An optimal class of symmetric key generation systems. In Advances in Cryptology, EUROCRYPTąŕ'84, LNCS 209, pages 335--338, 1984.
[5]
Jean-Yves Le Boudec and Milan Vojnovic. Perfect simulation and stationarity of a class of mobility models. In Proceedings of IEEE INFOCOM, pages 2743--2754, 2005.
[6]
L. Buttyán and I. Vajda. Towards provable security for ad hoc routing protocols. In Second ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN), 2004.
[7]
W. Du, J. Deng, Y. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proc. of 10th ACM Conference on Computer and Communications Security (CCS), pages 27--31, 2003.
[8]
M.T. Goodrich. Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts. In Proceedings of IEEE Symposium on Security and Privacy, pages 196--207, May 2005.
[9]
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), pages 12--23, 2002.
[10]
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1--2):21--38, 2005.
[11]
David B Johnson, David A Maltz, and Y.-C. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). In Internet Draft, draft-ietf-manet-dsr-09.txt, April 2003.
[12]
F. Kargl, A. Geiβ, S. Schlott, and M. Weber. Secure dynamic source routing. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS), January 2005.
[13]
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Proc. of 10th ACM Conference on Computer and Communications Security (CCS), 2003.
[14]
P. Papadimitratos and Z. Haas. Secure routing for mobile ad hoc networks. In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), Jan. 2002.
[15]
C. E. Perkins, E. M. Belding-Royer, and S. R. Das. Ad Hoc On Demand Distance Vector (AODV) Routing. IETF, July 2003. RFC 3561.
[16]
A. Perrig, R. Canetti, D. Song, and J.D. Tygar. Efficient and secure source authentication for multicast. In Network and Distributed System Security Symposium (NDSS), 2001.
[17]
Jean-Francois Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In Anonymity 2000, LNCS 2009, pages 10--29, 2001.
[18]
K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer. A secure routing protocol for ad hoc networks. Proceedings of IEEE ICNP, 2002.
[19]
J. Yoon, M. Liu, and B. Noble. Sound mobility models. In Proceedings of ACM MobiCom, 2003.
[20]
M. G. Zapata. Secure ad hoc on-demand distance vector (SAODV) routing. In IETF Internet Draft. http://www.ietf.org/internet-drafts/draft-guerrero-manet-saodv-00.txt, 2001.
[21]
S. Zhu, S. Setia, S. Jajodia, and P. Ning. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, 2004.
[22]
S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of IEEE ICNP, 2003.

Index Terms

  1. On identifying malicious nodes in ad hoc networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IWCMC '07: Proceedings of the 2007 international conference on Wireless communications and mobile computing
    August 2007
    716 pages
    ISBN:9781595936950
    DOI:10.1145/1280940
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 August 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ad hoc networks
    2. secure routing protocols

    Qualifiers

    • Article

    Conference

    IWCMC07
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 629
      Total Downloads
    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media