ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks

Ad hoc wireless networks provide mobile communication capability to satisfy a need of a temporary nature and without the existence of any well-defined infrastructure. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. In this paper, we propose a solution of triple umpiring system (TUS) that provides security for routing and data forwarding operations. In our system, each node's behaviour from source to destination is closely monitored by a set of three umpires. If any misbehaviour is noticed, umpires flag off the guilty node from the circuit. We have proposed two enhancements to the basic TUS for salvaging the circuit during disruptions in route reply and data forwarding phases. The model with these two enhancements is called ETUS. We have implemented TUS and ETUS by modifying the prominent AODV protocol. Extensive investigation studies using QualNet 5.0.2 establish the soundness and robustness of the proposal.

[1]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[2]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[3]  Kamesh Namuduri,et al.  Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis , 2005, EURASIP J. Wirel. Commun. Netw..

[4]  Cynthia E. Irvine,et al.  An Ontological Approach to Secure MANET Management , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[5]  Srikanth V. Krishnamurthy,et al.  Ad Hoc Networks: Technologies And Protocols , 2009, ADHOCNETS 2010.

[6]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[7]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[8]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[9]  Klara Nahrstedt,et al.  SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks , 2009, IEEE Transactions on Information Forensics and Security.

[10]  Magdy S. El-Soudani,et al.  Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[11]  Lei Feng-Yu,et al.  Ad Hoc Networks Security Mechanism Based on CPK , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[12]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[13]  M. Hauspie,et al.  Enhancing nodes cooperation in ad hoc networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.

[14]  Liu Dan,et al.  A Novel Cryptography for Ad Hoc Network Security , 2006, 2006 International Conference on Communications, Circuits and Systems.

[15]  Jeong Hyun Yi,et al.  Threshold cryptography in P2P and MANETs: The case of access control , 2007, Comput. Networks.

[16]  Imrich Chlamtac,et al.  A distance routing effect algorithm for mobility (DREAM) , 1998, MobiCom '98.

[17]  Jun Zheng,et al.  Security in Wireless Mesh Networks , 2007 .

[18]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[19]  Mukesh Singhal,et al.  Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks , 2005, MSWiM '05.

[20]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks , 2007 .

[21]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[22]  Binod Vaidya,et al.  Robust and secure routing scheme for wireless multihop network , 2009, Personal and Ubiquitous Computing.

[23]  Zuriati Ahmad Zulkarnain,et al.  Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment. , 2009 .

[24]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[25]  Stamatios V. Kartalopoulos Security of Information and Communication Networks , 2009 .

[26]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[27]  G. Pulla,et al.  A Survey on Security Issues in Wireless Ad hoc Network Routing Protocols , 2010 .

[28]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[29]  Mario Gerla,et al.  GloMoSim: A Scalable Network Simulation Environment , 2002 .

[30]  Nidal Nasser,et al.  Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[31]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[32]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[33]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[34]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.

[35]  Samir Ranjan Das,et al.  Query Localization Techniques for On-Demand Routing Protocols in Ad Hoc Networks , 1999, Wirel. Networks.

[36]  Songwu Lu,et al.  SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[37]  Jalel Ben-Othman,et al.  Logical Wormhole Prevention in Optimized Link State Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[38]  Ayyaswamy Kathirvel,et al.  A Study on Salvaging Route Reply for AODV Protocol in the Presence of Malicious Nodes , 2009 .

[39]  Sung-Ju Lee,et al.  AODV-BR: backup routing in ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[40]  Amitabh Mishra Security and Quality of Service in Ad Hoc Wireless Networks , 2008 .