A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks

A Mobile Ad hoc Network (MANET) is a dynamic network composed of mobile nodes that can communicate without relying on an existing infrastructure. In such decentralized environment, packet forwarding and other routing services are provided by network nodes cooperatively without any central administration. Most of existing Ad hoc routing protocols are based on the assumption that all network nodes are trustworthy. However, this assumption may be inconsistent when a malicious node decides to drop packets that are supposed to be forwarded in the aim of disrupting the routing services. Furthermore, the malicious node can change its behavior over time in order to appear as a legitimate node and still disrupting the network without being detected. To address this problem, we propose in this paper a fully decentralized mechanism that allows a node to monitor and detect neighbors that are malicious even if they have a changing behavior. Our mechanism is based on a Bernoulli Bayesian model for nodes behavior classification and a Markov chain model for behavior evolution tracking. Performance analysis of numerical results obtained using NS2 simulations show an accurate detection of malicious nodes, which can be used to guarantee a reliable and secure packet forwarding among network nodes.

[1]  Bu-Sung Lee,et al.  Cross-Layer Detection of Sinking Behavior in Wireless Ad Hoc Networks Using SVM and FDA , 2011, IEEE Transactions on Dependable and Secure Computing.

[2]  Ba-Ngu Vo,et al.  A Tutorial on Bernoulli Filters: Theory, Implementation and Applications , 2013, IEEE Transactions on Signal Processing.

[3]  Christos Dimitrakakis,et al.  Intrusion detection in MANET using classification algorithms: The effects of cost and model selection , 2013, Ad Hoc Networks.

[4]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[5]  Lyes Khoukhi,et al.  Denial of Service (DoS) attacks detection in MANETs through statistical models , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).

[6]  Levent Ertaul,et al.  Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs) , 2009, Security and Management.

[7]  Lyes Khoukhi,et al.  Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers , 2014, 2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT).

[8]  Juliette Dromard,et al.  A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network , 2013, ICT 2013.

[9]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[10]  Edwin Hsing-Mean Sha,et al.  Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks , 2016, J. Netw. Comput. Appl..

[11]  Rida Khatoun ASROP : AD HOC Secure Routing Protocol , 2012 .

[12]  Xiaoping Li,et al.  Trust based routing mechanism for securing OSLR-based MANET , 2015, Ad Hoc Networks.

[13]  Peter D. Hoff,et al.  A First Course in Bayesian Statistical Methods , 2009 .

[14]  Michael P. Howarth,et al.  An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.

[15]  Vanita Bokhare,et al.  A secure NCPR for reducing routing overhead in MANET , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).

[16]  Juliette Dromard,et al.  A statistical trust system in wireless mesh networks , 2016, Ann. des Télécommunications.

[17]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[18]  Konrad Jacobs,et al.  Lecture notes on ergodic theory , 1963 .

[19]  Vijay Laxmi,et al.  JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET , 2015, J. Inf. Secur. Appl..

[20]  Paolo Bellavista,et al.  Convergence of MANET and WSN in IoT Urban Scenarios , 2013, IEEE Sensors Journal.

[21]  Neri Merhav,et al.  Hidden Markov processes , 2002, IEEE Trans. Inf. Theory.

[22]  Bo Wang,et al.  A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..

[23]  Gabriel Maciá-Fernández,et al.  A model of data forwarding in MANETs for lightweight detection of malicious packet dropping , 2015, Comput. Networks.

[24]  B. Solhaug,et al.  Why Trust is not Proportional to Risk , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).