Abstract
Mobile ad hoc network (MANET) is vulnerable to security attacks because of the shared radio medium and lack of centralized coordination. Since most multi-hop routing protocols implicitly assume cooperative routing and are not originally designed for security attacks, MANET has been challenged by diverse denial-of-service attacks that often interfere with the protocol and interrupt on-going communication. In this paper, we propose an explore-based active detection scheme, called EBAD, to efficiently mitigate the routing misbehaviors in MANETs running with dynamic source routing. The basic idea is that a source node broadcasts a route request packet with a fictitious destination node to lure potential malicious nodes to reply a fake route reply packet. If the source node receives the fake route reply packet or an intermediate node cannot decrypt the received route reply packet, the routing misbehavior can be detected. We also propose a route expiry timer based approach to reduce the effect of route cache pollution because of the fake route reply. We present a simple analytical model of the EBAD and its numerical result in terms of detection rate. We also conduct extensive simulation experiments using the OMNeT++ for performance evaluation and comparison with the existing schemes, CBDS and 2ACK. The simulation results show that the proposed countermeasure can not only improve the detection rate and packet delivery ratio but also can reduce the energy consumption and detection latency.
















Similar content being viewed by others
References
Loo, J., Mauri, J. L., & Ortiz, J. H. (2016). Mobile ad hoc networks: Current status and future trends. Boca Raton: CRC Press.
Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski, & H. F. Korth (Eds.), Mobile computing (pp. 153–181). Boston, MA: Springer.
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of ACM MOBICOM, pp. 255–265.
Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. In Proceedings of IEEE IPDPS, pp. 1–8.
Xiao, B., Yu, B., & Gao, C. (2007). CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11), 1218–1230.
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.
Shila, D. M., Yu, C., & Anjali, T. (2010). Mitigating selective forwarding attacks with a channel-aware approach in WMNs. IEEE Transactions on Wireless Communications, 9(5), 1661–1675.
Liu, Q., Yin, J., Leung, V., & Cai, Z. (2013). FADE: Forwarding assessment based detection of collaborative grey hole attacks in WMNs. IEEE Transactions on Wireless Communications, 12(10), 5124–5137.
Chae, Y., DiPippo, L. C., & Sun, Y. L. (2015). Trust management for defending on-off attacks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 1178–1191.
Ren, J., Zhang, Y., Zhang, K., & Shen, X. S. (2014). Exploiting channel-aware reputation system against selective forwarding attacks in WSNs. In Proceedings of IEEE GLOBECOM, pp. 330–335.
Ren, J., Zhang, Y., Zhang, K., & Shen, X. (2016). Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(5), 3718–3731.
Pu, C., & Lim, S. (2016). A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: Design, analysis, and evaluation. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2016.2535730.
Chang, J.-M., Tsou, P.-C., Woungang, I., Chao, H.-C., & Lai, C.-F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65–75.
A. Varga. (2014). OMNeT++. http://www.omnetpp.org/.
Lim, S., & Lauren, H. (2015). Hop-by-hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks. In Proceedings of IEEE ICNC, pp. 315–319.
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38.
Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2002). The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(2), 2–13.
Dong, Y., Chim, T. W., Li, V. O., Yiu, S.-M., & Hui, C. (2009). ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Networks, 7(8), 1536–1550.
Li, X., Li, H., Ma, J., & Zhang, W. (2009). An efficient anonymous routing protocol for mobile ad hoc networks. In Fifth international conference on information assurance and security, 2009 (IAS’09), vol. 2. IEEE, pp. 287–290.
Song, R., Korba, L., & Yee, G. (2005). AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks. ACM, pp. 33–42.
Pu, C., & Lim, S. (2015). Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks. In Proceedings of IEEE MILCOM, pp. 903–908.
Midi, D., & Bertino, E. (2016). Node or link? Fine-grained analysis of packet-loss attacks in wireless sensor networks. ACM Transactions on Sensor Networks, 12(2), 8.
Zhang, Y., Lazos, L., & Kozma, W. (2016). AMD: Audit-based misbehavior detection in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 15(8), 1893–1907.
Stehlik, M., Matyas, V., & Stetsko, A. (2016). Towards better selective forwarding and delay attacks detection in wireless sensor networks. In Proceedings of IEEE ICNSC, pp. 1–6.
Lim, S., Yu, C., & Das, C. R. (2009). RandomCast: An energy efficient communication scheme for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 8(3), 351–369.
Haghighi, A., Mizanian, K., & Mirjalily, G. (2015). Modified CBDS for defending against collaborative attacks by malicious nodes in MANETs. In 2nd international conference on KBEI. IEEE, pp. 902–907.
Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks, 7(6), 1097–1109.
Stallings, W. (2013). Cryptography and network security—Principles and practices (6th ed.). Upper Saddle River: Prentice Hall.
Conti, M., Pietro Di, R., Mancini, L., & Mei, A. (2008). Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. In Proceedings of ACM wireless network security, pp. 214–219.
Reibel, J. (2002). An IP address configuration algorithm for zeroconf. mobile multi-hop ad-hoc networks. In Proceedings of the international workshop on broadband wireless ad-hoc networks and services. Citeseer, Sophia Antipolis.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE INFOCOM, pp. 1976–1986.
Chatterjee, P., Ghosh, U., Sengupta, I., & Ghosh, S. (2014). A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Networks, 20(7), 1669–1684.
Li, X., Lu, R., Liang, X., & Shen, X. (2011). Side channel monitoring: Packet drop attack detection in wireless ad hoc networks. In Proceedings of IEEE ICC, pp. 1–5.
Marina, M. K., & Das, S. R. (2001). Performance of route caching strategies in dynamic source routing. In International workshop on wireless networks and mobile computing (WNMC), pp. 425–432.
Tang, X., & Xu, J. (2006). Extending network lifetime for precision-constrained data aggregation in wireless sensor networks. In Proceedings of IEEE INFOCOM, pp. 1–12.
Perkins, C., & Belding-Royer, E. (1999). Ad hoc on-demand distance vector routing. In Proceedings of WMCSA, pp. 90–100.
Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of SIGCOMM, pp. 234–244.
Acknowledgements
This research was supported in part by Startup grant in Division of Computer Science at Marshall University.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Pu, C., Lim, S., Chae, J. et al. Active detection in mitigating routing misbehavior for MANETs. Wireless Netw 25, 1669–1683 (2019). https://doi.org/10.1007/s11276-017-1621-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-017-1621-z