Defense against Routing Disruption Denial-of- Service Attacks in Mobile Ad Hoc Networks
نویسندگان
چکیده
Mobile Ad hoc NETworks (MANETs) are decentralized environments comprised of mobile computing devices that interact among each other via multi-hop wireless links. MANET nodes forward packets on behalf of other nodes in the network. Such routing decisions are made autonomously by individual nodes. MANET characteristics make them highly vulnerable to a myriad of physical and cyber attacks. Cryptographic solutions, while effective for maintaining confidentiality and authentication, cannot mitigate some critical attacks on MANET availability, in particular insider and protocol-compliant routing disruption Denial-of-Service (DoS) attacks. This paper proposes a novel secure routing architecture for MANET called ThroughpUt-Feedback (TUF) routing, which is designed to be resilient against most known forms of routing disruption DoS attacks. Our approach is to monitor the end-to-end "good" throughput (or "goodput") of closed-loop flows to detect attacks that are impossible to detect using existing methods operating at the network layer. A major advantage of the TUF architecture is that it can be readily integrated into on-demand source routing protocols. TUF provides mechanisms that monitor the goodput of the current route to detect abnormalities (e.g., node or link failures, DoS attacks, etc.), and then initiates a route rebuilding process once the route has been determined to be abnormal. TUF is agile in that it is designed in a way that allows it to limit control overhead by using low-overhead schemes until an attack condition requires the use of higher-overhead route management schemes. Using analysis and simulations, we show that the TUF architecture is resilient against a wide range of attacks, including protocol-compliant (also known as "JellyFish") attacks. Keywords-Mobile Ad Hoc Networks; Denial-of-Service
منابع مشابه
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملDefense against Routing Disruption Attacks in Mobile Ad Hoc Networks
We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disruption Denial-of-Service (DoS) attacks. Unlike many existing solutions, TUF does not focus on a particular type of attack, but instead takes an approach that is fundamentally more general. TUF is a cross-layer technique tha...
متن کاملA New Routing Attack in Mobile Ad Hoc Networks
Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a ne...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملAn Integrated Defense Approach for Distributed Denial of Service Attacks In Mobile Ad-Hoc Network
Distributed Denial-of-Service (DDoS) attacks are a variant of Denial-of-Service (DoS) attacks where an attacker or a group of attackers employ multiple machines to carry out a DoS attack simultaneously, therefore increasing its effectiveness and strength. DDoS attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005