Secure Routing Techniques to Mitigate Insider Attacks in Wireless Ad Hoc Networks
نویسندگان
چکیده
Route falsification attacks are easy to launch in wireless ad hoc networks with on demand routing protocols that employ network-wide flooding of control packets for route discoveries. Colluding insider malicious nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts in routing paths and influence data traffic to flow through them. The current secure on demand routing protocols for ad hoc networks are susceptible to these attacks. This paper presented several design guidelines to mitigate the impact of such attacks and a secure on-demand routing (SOR) protocol that incorporates these techniques. SOR is based on pairwise symmetric keys among all nodes in the network. It is flexible and can be tweaked to accommodate desired security and performance criteria. We implemented SOR and a previously proposed secure routing protocol called Ariadne in the Glomosim simulator and evaluated their performances with and without route falsification attacks by colluding insider nodes. Our analysis indicates that SOR is resistent to these attacks and performs well with low overhead in normal networks.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملHoc Networks under Noise and Imperfect Monitoring
Title of Dissertation: SECURING WIRELESS AD HOC NETWORKS UNDER NOISE AND IMPERFECT MONITORING Wei Yu, Doctor of Philosophy, 2006 Dissertation directed by: Professor K. J. Ray Liu Department of Electrical and Computer Engineering While wireless communication has dramatically changed the way people work and interact, the wireless era continues to be plagued by insufficient security. Without neces...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملImproving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کامل