Secure Routing Techniques to Mitigate Insider Attacks in Wireless Ad Hoc Networks

نویسندگان

  • Rajendra V. Boppana
  • Xu Su
چکیده

Route falsification attacks are easy to launch in wireless ad hoc networks with on demand routing protocols that employ network-wide flooding of control packets for route discoveries. Colluding insider malicious nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts in routing paths and influence data traffic to flow through them. The current secure on demand routing protocols for ad hoc networks are susceptible to these attacks. This paper presented several design guidelines to mitigate the impact of such attacks and a secure on-demand routing (SOR) protocol that incorporates these techniques. SOR is based on pairwise symmetric keys among all nodes in the network. It is flexible and can be tweaked to accommodate desired security and performance criteria. We implemented SOR and a previously proposed secure routing protocol called Ariadne in the Glomosim simulator and evaluated their performances with and without route falsification attacks by colluding insider nodes. Our analysis indicates that SOR is resistent to these attacks and performs well with low overhead in normal networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Hoc Networks under Noise and Imperfect Monitoring

Title of Dissertation: SECURING WIRELESS AD HOC NETWORKS UNDER NOISE AND IMPERFECT MONITORING Wei Yu, Doctor of Philosophy, 2006 Dissertation directed by: Professor K. J. Ray Liu Department of Electrical and Computer Engineering While wireless communication has dramatically changed the way people work and interact, the wireless era continues to be plagued by insufficient security. Without neces...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007