TOGBAD - an approach to detect routing attacks in tactical environments

Topology graph based anomaly detection (TOGBAD) is a centralized approach to detect routing attacks in tactical multi-hop networks. It uses anomaly detection based on topology graphs to identify attackers trying to launch routing attacks. Such attacks are a serious threat to multi-hop networks since they may be used to disrupt, eavesdrop or manipulate the network. In this work, we present studies on the impact of an attacker launching a routing attack. Furthermore, we show a reasonable choice of attack parameters for the attacker. In our main contribution, we introduce TOGBAD and an evaluation of TOGBAD concerning its detection rate with and without packet loss. Finally, we illustrate TOGBAD's detection rate with an attacker trying to inure TOGBAD's anomaly detection to his attack. Copyright © 2010 John Wiley & Sons, Ltd.

[1]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .

[2]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[3]  Tracy Camp,et al.  MANET simulation studies: the incredibles , 2005, MOCO.

[4]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[5]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[6]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[7]  Christian Wagner,et al.  The Spatial Node Distribution of the Random Waypoint Mobility Model , 2002, WMAN.

[8]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[10]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[11]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[12]  Marko Jahnke,et al.  MITE – MANET Intrusion Detection for Tactical Environments , 2008 .

[13]  N. Aschenbruck,et al.  Enhancements on and evaluation of TOGBAD in tactical MANETs , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[14]  S. Muknahallipatna,et al.  Fibre Channel Switch Modeling at Fibre Channel-2 Level for Large Fabric Storage Area Network Simulations using OMNeT++ , 2007 .

[15]  S.S. Ramaswami,et al.  Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing , 2006, 2006 IEEE Information Assurance Workshop.

[16]  M. Wang,et al.  An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[17]  Udo W. Pooch,et al.  Cooperative security-enforcement routing in mobile ad hoc networks , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[18]  Ricardo Staciarini Puttini,et al.  Combining Certification-based Authentication and Intrusion Detection to Secure Manet Routing Protocols , 2004 .

[19]  M. Weber,et al.  Sensors for Detection of Misbehaving Nodes in MANETs , 2004, PIK Prax. Informationsverarbeitung Kommun..

[20]  Liang Hong,et al.  Secure OLSR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[21]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[22]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[23]  Frank Kargl Sicherheit in Mobilen Ad hoc Netzwerken , 2003, Ausgezeichnete Informatikdissertationen.

[24]  CampTracy,et al.  MANET simulation studies , 2005 .

[25]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[26]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[27]  Thomas Clausen,et al.  Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2 , 2010 .

[28]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[29]  Paul Mühlethaler,et al.  An advanced signature system for OLSR , 2004, SASN '04.

[30]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[31]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[32]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).