Abstract
The routing misbehavior is one of the most serious threats to wireless ad hoc networks where nodes are not forwarding messages correctly. Once the attack has been launched, nodes in the network are not able to send messages anymore. Thus it could be a kind of DoS (denial of service) attack. So far, in order to detect the attack, most researches employ a watchdog method although it is not efficient and has a high false positive ratio. In this paper, we propose a novel approach to detect the attacks based on routing misbehavior. It can detect attacks in a more effective way as well as solve problems in existing watchdog. In the proposed method a node in the network cooperates with its neighbor nodes to collect statistics on packets. According to the statistical information, the method determines each nodes misbehavior. The simulation results shows that the proposed method is practical and effective to apply to real domain.
Similar content being viewed by others
References
Yang H, Luo H, Ye F, Lu S, Zhang L (2004) Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel Commun 11(1):38–47
Aad I, Hubaux JP, Knightly E.W. (2008) Impact of denial of service attacks on ad hoc networks. IEEE Trans Netw 16(4):791–802
Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(1):24–30
Marti S, Giuli T, Lai K, Baker M (2008) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings the 6th annual international conf. on mobile computing and networking, pp. 255–265, Boston
Djenouri D, Khalladi L, Badache N (2005) A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun Surv Tutor 7(4):2–28
Yang H, Meng X, Lu S (2002) Self-organized network layer security in mobile ad hoc networks. In: Proceedings of acm workshop on wireless security, pp. 11–20, Atlanta
Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of communication and multimedia security, pp 107–121
Djenouri D, Badache N (2005) New approach for selfish nodes detection in mobile ad hoc networks. In: Proceedings of International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 288–294
Duque OG, Hadjiantonis A, Pavlou G, Howarth M (2009) Adaptable misbehaviour detection and isolation in wireless ad hoc networks using policies. In: Proceedings of international conference on security and privacy for emerging areas in communication networks, pp 288–294
Bradley KA, Cheung S, Puketza N, Mukherjee B, Olsson RA (1998) Detecting disruptive routers: a distributed network monitoring approach. In: Proceedings of symposium on security and privacy, pp 115–124
Boutaba R, Aib I (2007) Policy-based management: a historical perspective. J Netw Syst Manag 15(4)
Hadjiantonis AM, Malatras A, Pavlou G (2006) A context-aware, policy-based framework for the management of MANETs. In: Proceedings of 7th IEEE international workshop on policies for distributed systems and networks, pp 23–32
Acknowledgments
This work was supported by the Power Generation & Electricity Delivery of the Korea Institute of Energy Technology Evaluation and Planning (KETEP) grant funded by the Korea government Ministry of Knowledge Economy (No.2010101040046A and No. 2011101050001A)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, G., Kim, W., Kim, K. et al. An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks. Peer-to-Peer Netw. Appl. 8, 684–693 (2015). https://doi.org/10.1007/s12083-013-0215-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-013-0215-5