skip to main content
10.1145/3345860.3361511acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

On the Robustness of Root Locus based Routing Attack-Detection in Reconfigurable Wireless Networks

Published: 25 November 2019 Publication History

Abstract

Data routing is one of the most essential functions having a direct impact on network performance. Due to the lack of any fixed infrastructure, data routing must be achieved through collaboration of nodes in Reconfigurable Wireless Networks (RWN). This implies that a malicious node can participate in the routing process and launch an attack to gain control over data traffic. Intrusion Detection Systems (IDS) are typically used to recognize malicious activities. Any IDS for routing attack-detection in RWN should be able to detect a wide variety of attacks and must have into consideration the computing and power restrictions that some nodes could have. A mathematical framework for a root locus based IDS for routing in RWN has been presented in recent literature achieving promising attack-detection accuracy for a case study. This root locus based IDS consists in modeling the dynamic behavior of neighboring nodes at a given instant as a linear system. In this paper, we analyze through simulations the attack-detection performance of that root locus based IDS for the worst case, where the number of delayed samples of the signals used to characterize the system, is minimum. We show that even for these severely restricted models, the analyzed attack-detection scheme is robust enough to be used in a wide range of network conditions. We analyze the method performance for a wide variety of routing attacks, the effects of node mobility, attacker's position and different node densities.

References

[1]
Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani. 2008. A survey of secure mobile Ad Hoc routing protocols. IEEE Communications Surveys & Tutorials, Vol. 10, 14 (2008), 78--93. https://doi.org/10.1109/SURV.2008.080407
[2]
Amr El-Mougy and G. Hattab. 2016. Reconfigurable wireless networks. Proceedings of IEEE, Vol. 103, 7 (2016), 1125--1158. https://doi.org/10.1109/JPROC.2014.2376812
[3]
Y. Jahir, M. Atiquzzaman, H. Refai, A Paranjothi, and P.G. LoPresti. 2019. Routing protocols and architecture for Disaster Area Network: A survey. Ad Hoc Networks, Vol. 82 (2019), 1--14. https://doi.org/10.1016/j.adhoc.2018.08.005
[4]
Luo Junhai, Ye Danxia, Xue Liu, and Fan Mingyu. 2009. A survey of multicast routing protocols for mobile Ad-Hoc networks. IEEE Communications Surveys & Tutorials, Vol. 11, 1 (2009), 78--91. https://doi.org/10.1109/SURV.2009.090107
[5]
Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour. 2007. A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, Vol. 14, 5 (2007), 85--91. https://doi.org/10.1109/MWC.2007.4396947
[6]
Z.A. Khan and P. Herrmann. 2019. Recent advancements in intrusion detection systems for the internet of things. Security and Communication Networks, Vol. 2019 (2019). https://doi.org/10.1155/2019/4301409
[7]
Sunil Kumar and Kamlesh Dutta. 2016. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Security and Communication Networks, Vol. 9, 14 (2016), 2484--2556. https://doi.org/10.1002/sec.1484
[8]
Mohamed M.E.A. Mahmoud, Xiaodong Lin, and Xuemin (Sherman) Shen. 2015. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks. IEEE Transactions on Parallel and Distributed Systems, Vol. 26, 4 (2015), 1140--1153. https://doi.org/10.1109/TPDS.2013.138
[9]
Adnan Nadeem and Michael P. Howarth. 2013. A Survey of MANET Intrusion Detection and Prevention Approaches for Network Layer Attacks. IEEE Communications Surveys and Tutorials, Vol. 15, 4 (2013), 2027--2045. https://doi.org/10.1109/SURV.2013.030713.00201
[10]
Oladayo O. Olakanmi, Adama Pamela, and Abbas Ashraf. 2017. A review on secure routing protocols for wireless sensor networks. International Journal of Sensors, Wireless Communications and Control, Vol. 7, 2 (2017), 79--92. https://doi.org/10.2174/2210327907666170906144322
[11]
O.S. Oubbati, M. Atiquzzaman, P Lorenz, M.H Tareque, and M.S Hossain. 2019. Routing in flying Ad Hoc networks: Survey, constraints, and future challenge perspectives. IEEE Access, Vol. 7, 8741010 (2019), 81057--81105. https://doi.org/10.1109/ACCESS.2019.2923840
[12]
V.K. Quy, N.T. Ban, V.H. Nam, D.M. Tuan, and N.D. Han. 2019. Survey of recent routing metrics and protocols for mobile Ad-hoc networks. Journal of Communications, Vol. 14, 2 (2019), 110--120. https://doi.org/10.12720/jcm.14.2.110--120
[13]
A.-U. Rehman, S.U. Rehman, and H. Raheem. 2019. Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wireless Personal Communications, Vol. 16, 4 (2019), 2291--2313. https://doi.org/10.1007/s11277-018--6040--7
[14]
Ivana Tomic and Julie A. McCann. 2017. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols. IEEE Internet of Things Journal, Vol. 4, 6 (2017), 1910--1923. https://doi.org/10.1109/JIOT.2017.2749883
[15]
A. Vasudeva and M. Sood. 2018. Survey on sybil attack defense mechanisms in wireless ad hoc networks. Journal of Network and Computer Applications, Vol. 120 (2018), 78--118. https://doi.org/10.1016/j.jnca.2018.07.006
[16]
Jaime Zuniga-Mejia, Rafaela Villalpando-Hernandez, Cesar Vargas-Rosales, and Andreas Spanias. 2019. A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks. IEEE Access, Vol. 7 (may 2019), 2484--2556. https://doi.org/10.1109/ACCESS.2019.2915936

Cited By

View all
  • (2021)LC-IDS: Loci-Constellation-Based Intrusion Detection for Reconfigurable Wireless NetworksElectronics10.3390/electronics1024305310:24(3053)Online publication date: 7-Dec-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PE-WASUN '19: Proceedings of the 16th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks
November 2019
87 pages
ISBN:9781450369084
DOI:10.1145/3345860
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 November 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dimensionality reduction
  2. linear systems.
  3. network intrusion detection system
  4. reconfigurable wireless networks
  5. routing attacks

Qualifiers

  • Research-article

Funding Sources

  • SEP-CONACYT

Conference

MSWiM '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 70 of 240 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 27 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)LC-IDS: Loci-Constellation-Based Intrusion Detection for Reconfigurable Wireless NetworksElectronics10.3390/electronics1024305310:24(3053)Online publication date: 7-Dec-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media