skip to main content
10.1145/1062689.1062722acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
Article

A secure ad-hoc routing approach using localized self-healing communities

Published:25 May 2005Publication History

ABSTRACT

Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protocol compliant. For instance, since packet loss is common in mobile wireless networks, the adversary can exploit this fact by hiding its malicious intents using compliant packet losses that appear to be caused by environmental reasons.In this paper we study two routing attacks that use non-cooperative network members and disguised packet losses to deplete ad hoc network resources and to reduce ad hoc routing performance. These two routing attacks have not been fully addressed in previous research. We propose the design of "self-healing community" to counter these two attacks. Our design exploits the redundancy in deployment which is typical of most ad hoc networks; Namely, it counters non-cooperative attacks using the probabilistic presence of nearby cooperative network members.To realize the new paradigm, we devise localized simple schemes to (re-)configure self-healing communities in spite of random node mobility. We develop a general analytic model to prove the effectiveness of our design. Then we implement our secure ad hoc routing protocols in simulation to verify the cost and overhead incurred by maintaining the communities. Our study confirms that the community-based security is a cost-effective strategy to make off-the-shelf ad hoc routing protocols secure.

References

  1. I. Aad, J.-P. Hubaux, and E. W. Knightly. Denial of Service Resilience in Ad Hoc Networks. In ACM MOBICOM, pages 202--215, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In First ACM Workshop on Wireless Security (WiSe), pages 21--30, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Bettstetter. Mobility Modeling in Wireless Networks: Categorization, Smooth Movement, and Border Effects. ACM Mobile Computing and Communication Review, 5(3):55--67, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Bettstetter, H. Hartenstein, and X. Perez-Costa. Stochastic Properties of the Random Waypoint Mobility Model. ACM/Kluwer Wireless Networks, Special Issue on Modeling and Analysis of Mobile Networks, 10(5):555--567, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Bettstetter and C. Wagner. The Spatial Node Distribution of the Random Waypoint Mobility Model. In German Workshop on Mobile Ad Hoc Networks (WMAN), pages 41--58, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Brands and D. Chaum. Distance-Bounding Protocols (Extended Abstract). In T. Helleseth, editor, EUROCRYPT'93, Lecture Notes in Computer Science 765, pages 344--359, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Cressie. Statistics for Spatial Data. John Wiley and Sons, 1993.]]Google ScholarGoogle Scholar
  8. J. Deng, R. Han, and S. Mishra. Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks. In IEEE International Conference on Dependable Systems and Networks (DSN), pages 594--603, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Douceur. The Sybil Attack. In Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002), 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. M. Feeney and M. Nilsson. Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In IEEE INFOCOM, 2001.]]Google ScholarGoogle ScholarCross RefCross Ref
  11. L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Network and Distributed System Security Symposium (NDSS), 2004.]]Google ScholarGoogle Scholar
  12. Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In ACM MOBICOM, pages 12--23, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In IEEE INFOCOM, 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  14. Y.-C. Hu, A. Perrig, and D. B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. In ACM WiSe'03 in conjunction with MOBICOM'03, pages 30--40, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. Korth, editors, Mobile Computing, volume 353, pages 153--181. Kluwer Academic Publishers, 1996.]]Google ScholarGoogle Scholar
  16. D. B. Johnson and D. A. Maltz. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), April 2003.]]Google ScholarGoogle Scholar
  17. J. Kong, X. Hong, J.-S. Park, Y. Yi, and M. Gerla. L'Hospital: Self-healing Secure Routing for Mobile Ad-hoc Networks. Technical Report CSD-TR040055, Dept. of Computer Science, UCLA, January 2005.]]Google ScholarGoogle Scholar
  18. M. K. Marina and S. R. Das. Ad Hoc On-demand Multipath Distance Vector Routing. In IEEE ICNP, pages 14--23, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In ACM MOBICOM, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad Hoc Networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), 2002.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P. Papadimitratos and Z. J. Haas. Secure Data Transmission in Mobile Ad Hoc Networks. In Second ACM Workshop on Wireless Security (WiSe), pages 41--50, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. E. Perkins and E. M. Royer. Ad-Hoc On-Demand Distance Vector Routing. In IEEE WMCSA'99, pages 90--100, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. E. Perkins, E. M. Royer, and S. Das. Ad-hoc On Demand Distance Vector (AODV) Routing. http://www.ietf.org/rfc/rfc3561.txt, July 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5(2):2--13, 2002.]]Google ScholarGoogle Scholar
  25. G. Resta and P. Santi. An Analysis of the Node Spatial Distribution of the Random Waypoint Model for Ad Hoc Networks. In ACM Workshop on Principles of Mobile Computing (POMC), pages 44--50, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. P. Sambasivam, A. Murthy, and E. M. Belding-Royer. Dynamically Adaptive Multipath Routing based on AODV. In Med-Hoc-Net, 2004.]]Google ScholarGoogle Scholar
  27. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. Royer. A Secure Routing Protocol for Ad Hoc Networks. In 10th International Conference on Network Protocols (IEEE ICNP'02), 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Scalable Network Technologies (SNT). QualNet. http://www.qualnet.com/.]]Google ScholarGoogle Scholar
  29. C. Sengul and R. Kravets. Bypass Routing: An On-Demand Local Recovery Protocol for Ad Hoc Networks. In Med-Hoc-Net, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. E. Shih, P. Bahl, and M. Sinclair. Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices. In ACM MOBICOM, pages 160--171, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Čapkun, L. Buttyán, and J.-P. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pages 21--32, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. J. Yoon, M. Liu, and B. Noble. Sound Mobility Models. In ACM MOBICOM, pages 205--216, 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. M. G. Zapata and N. Asokan. Securing Ad Hoc Routing Protocols. In First ACM Workshop on Wireless Security (WiSe), pages 1--10, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A secure ad-hoc routing approach using localized self-healing communities

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
      May 2005
      470 pages
      ISBN:1595930043
      DOI:10.1145/1062689

      Copyright © 2005 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 May 2005

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate296of1,843submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader