Mitigating Misleading Routing Attack using path signature in Mobile Ad-Hoc Networks

The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking made mobile ad-hoc network (MANET) a popular research topic recently. However, the flexible deployment nature and the lack of fixed infrastructure make MANETs suffer from a variety of security attacks. We, in this paper, discuss the Misleading Routing Attack (MIRA) in Mobile Ad-hoc Networks and propose a mitigation scheme using a dynamic one-way hash chain to form a path signature to sign the path, thus allowing the nodes on the path to detect any unexpected changes occur in the path. Our simulation results show that by applying our path signature mitigation scheme, we can improve the network performance under MIRA attack in terms of packets transmission/retransmission in the network.

[1]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[2]  Weiyi Zhang,et al.  MIRA: Misleading Routing Attack in Mobile Ad-Hoc Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[3]  Donald F. Towsley,et al.  Secure Wireless Communication with Dynamic Secrets , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  Virgil D. Gligor Handling New Adversaries in Secure Mobile Ad-Hoc Networks , 2007 .

[5]  Devu Manikantan Shila,et al.  Defending selective forwarding attacks in WMNs , 2008, 2008 IEEE International Conference on Electro/Information Technology.

[6]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[7]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[8]  Jean-Pierre Hubaux,et al.  Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues , 2002, MobiCom '02.

[9]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[10]  Eui-nam Huh,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[11]  Levente Buttyán,et al.  Modelling adversaries and security objectives for routing protocols in wireless sensor networks , 2006, SASN '06.