Skip to main content
Log in

Active detection in mitigating routing misbehavior for MANETs

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile ad hoc network (MANET) is vulnerable to security attacks because of the shared radio medium and lack of centralized coordination. Since most multi-hop routing protocols implicitly assume cooperative routing and are not originally designed for security attacks, MANET has been challenged by diverse denial-of-service attacks that often interfere with the protocol and interrupt on-going communication. In this paper, we propose an explore-based active detection scheme, called EBAD, to efficiently mitigate the routing misbehaviors in MANETs running with dynamic source routing. The basic idea is that a source node broadcasts a route request packet with a fictitious destination node to lure potential malicious nodes to reply a fake route reply packet. If the source node receives the fake route reply packet or an intermediate node cannot decrypt the received route reply packet, the routing misbehavior can be detected. We also propose a route expiry timer based approach to reduce the effect of route cache pollution because of the fake route reply. We present a simple analytical model of the EBAD and its numerical result in terms of detection rate. We also conduct extensive simulation experiments using the OMNeT++ for performance evaluation and comparison with the existing schemes, CBDS and 2ACK. The simulation results show that the proposed countermeasure can not only improve the detection rate and packet delivery ratio but also can reduce the energy consumption and detection latency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Loo, J., Mauri, J. L., & Ortiz, J. H. (2016). Mobile ad hoc networks: Current status and future trends. Boca Raton: CRC Press.

    Google Scholar 

  2. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In T. Imielinski, & H. F. Korth (Eds.), Mobile computing (pp. 153–181). Boston, MA: Springer.

    Chapter  Google Scholar 

  3. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of ACM MOBICOM, pp. 255–265.

  4. Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. In Proceedings of IEEE IPDPS, pp. 1–8.

  5. Xiao, B., Yu, B., & Gao, C. (2007). CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11), 1218–1230.

    Article  MATH  Google Scholar 

  6. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.

    Article  Google Scholar 

  7. Shila, D. M., Yu, C., & Anjali, T. (2010). Mitigating selective forwarding attacks with a channel-aware approach in WMNs. IEEE Transactions on Wireless Communications, 9(5), 1661–1675.

    Article  Google Scholar 

  8. Liu, Q., Yin, J., Leung, V., & Cai, Z. (2013). FADE: Forwarding assessment based detection of collaborative grey hole attacks in WMNs. IEEE Transactions on Wireless Communications, 12(10), 5124–5137.

    Article  Google Scholar 

  9. Chae, Y., DiPippo, L. C., & Sun, Y. L. (2015). Trust management for defending on-off attacks. IEEE Transactions on Parallel and Distributed Systems, 26(4), 1178–1191.

    Article  Google Scholar 

  10. Ren, J., Zhang, Y., Zhang, K., & Shen, X. S. (2014). Exploiting channel-aware reputation system against selective forwarding attacks in WSNs. In Proceedings of IEEE GLOBECOM, pp. 330–335.

  11. Ren, J., Zhang, Y., Zhang, K., & Shen, X. (2016). Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(5), 3718–3731.

    Article  Google Scholar 

  12. Pu, C., & Lim, S. (2016). A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: Design, analysis, and evaluation. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2016.2535730.

    Google Scholar 

  13. Chang, J.-M., Tsou, P.-C., Woungang, I., Chao, H.-C., & Lai, C.-F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65–75.

    Article  Google Scholar 

  14. A. Varga. (2014). OMNeT++. http://www.omnetpp.org/.

  15. Lim, S., & Lauren, H. (2015). Hop-by-hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks. In Proceedings of IEEE ICNC, pp. 315–319.

  16. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38.

    Article  Google Scholar 

  17. Perrig, A., Canetti, R., Tygar, J. D., & Song, D. (2002). The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(2), 2–13.

    Google Scholar 

  18. Dong, Y., Chim, T. W., Li, V. O., Yiu, S.-M., & Hui, C. (2009). ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Networks, 7(8), 1536–1550.

    Article  Google Scholar 

  19. Li, X., Li, H., Ma, J., & Zhang, W. (2009). An efficient anonymous routing protocol for mobile ad hoc networks. In Fifth international conference on information assurance and security, 2009 (IAS’09), vol. 2. IEEE, pp. 287–290.

  20. Song, R., Korba, L., & Yee, G. (2005). AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks. ACM, pp. 33–42.

  21. Pu, C., & Lim, S. (2015). Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks. In Proceedings of IEEE MILCOM, pp. 903–908.

  22. Midi, D., & Bertino, E. (2016). Node or link? Fine-grained analysis of packet-loss attacks in wireless sensor networks. ACM Transactions on Sensor Networks, 12(2), 8.

    Article  Google Scholar 

  23. Zhang, Y., Lazos, L., & Kozma, W. (2016). AMD: Audit-based misbehavior detection in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 15(8), 1893–1907.

    Article  Google Scholar 

  24. Stehlik, M., Matyas, V., & Stetsko, A. (2016). Towards better selective forwarding and delay attacks detection in wireless sensor networks. In Proceedings of IEEE ICNSC, pp. 1–6.

  25. Lim, S., Yu, C., & Das, C. R. (2009). RandomCast: An energy efficient communication scheme for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 8(3), 351–369.

    Google Scholar 

  26. Haghighi, A., Mizanian, K., & Mirjalily, G. (2015). Modified CBDS for defending against collaborative attacks by malicious nodes in MANETs. In 2nd international conference on KBEI. IEEE, pp. 902–907.

  27. Kim, J., & Tsudik, G. (2009). SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks, 7(6), 1097–1109.

    Article  Google Scholar 

  28. Stallings, W. (2013). Cryptography and network security—Principles and practices (6th ed.). Upper Saddle River: Prentice Hall.

    Google Scholar 

  29. Conti, M., Pietro Di, R., Mancini, L., & Mei, A. (2008). Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. In Proceedings of ACM wireless network security, pp. 214–219.

  30. Reibel, J. (2002). An IP address configuration algorithm for zeroconf. mobile multi-hop ad-hoc networks. In Proceedings of the international workshop on broadband wireless ad-hoc networks and services. Citeseer, Sophia Antipolis.

  31. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.

    Article  MathSciNet  MATH  Google Scholar 

  32. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE INFOCOM, pp. 1976–1986.

  33. Chatterjee, P., Ghosh, U., Sengupta, I., & Ghosh, S. (2014). A trust enhanced secure clustering framework for wireless ad hoc networks. Wireless Networks, 20(7), 1669–1684.

    Article  Google Scholar 

  34. Li, X., Lu, R., Liang, X., & Shen, X. (2011). Side channel monitoring: Packet drop attack detection in wireless ad hoc networks. In Proceedings of IEEE ICC, pp. 1–5.

  35. Marina, M. K., & Das, S. R. (2001). Performance of route caching strategies in dynamic source routing. In International workshop on wireless networks and mobile computing (WNMC), pp. 425–432.

  36. Tang, X., & Xu, J. (2006). Extending network lifetime for precision-constrained data aggregation in wireless sensor networks. In Proceedings of IEEE INFOCOM, pp. 1–12.

  37. Perkins, C., & Belding-Royer, E. (1999). Ad hoc on-demand distance vector routing. In Proceedings of WMCSA, pp. 90–100.

  38. Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of SIGCOMM, pp. 234–244.

Download references

Acknowledgements

This research was supported in part by Startup grant in Division of Computer Science at Marshall University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cong Pu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pu, C., Lim, S., Chae, J. et al. Active detection in mitigating routing misbehavior for MANETs. Wireless Netw 25, 1669–1683 (2019). https://doi.org/10.1007/s11276-017-1621-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1621-z

Keywords

Navigation