Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks

Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention, however, attempts at thwarting an attack before it is executed. Both techniques can be realized either by the collective collaboration of network nodes (i.e., adding security messages to protocols) or by internal deduction of attack state. In this paper, we propose a method for minimizing the gray-hole DoS attack. Our solution assumes no explicit node collaboration, with each node using only internal knowledge gained by routine routing information. The technique was evaluated using five different threat models (different attacker capabilities), allowing for a better understanding of the attack surface and its prevention. Our simulation results show a decrease of up to 51 percent in previously dropped packet, greatly minimizing gray-hole attack effectiveness.

[1]  Jérôme Haerri,et al.  Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns , 2006 .

[2]  G. S. Bindra,et al.  Detection and removal of co-operative blackhole and grayhole attacks in MANETs , 2012, 2012 International Conference on System Engineering and Technology (ICSET).

[3]  M. Karthikeyan,et al.  Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2016, Wirel. Pers. Commun..

[4]  Anis Laouiti,et al.  Quantitative Evaluation of the Cost of Routing Protocol OLSR in a Vehicle Ad Hoc NETwork (VANET) , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[5]  C. Adjih,et al.  Attacks Against OLSR : Distributed Key Management for Security , 2022 .

[6]  Antonio F. Gómez-Skarmeta,et al.  Assessment of VANET multi-hop routing over an experimental platform , 2009, Int. J. Internet Protoc. Technol..

[7]  Roksana Boreli,et al.  Trusted routing for VANET , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).

[8]  Sukla Banerjee Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .

[9]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[10]  Daniele Rao,et al.  Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .

[11]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[12]  Nei Kato,et al.  NIS01-2: A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.

[13]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[14]  S. Muknahallipatna,et al.  Fibre Channel Switch Modeling at Fibre Channel-2 Level for Large Fabric Storage Area Network Simulations using OMNeT++ , 2007 .

[15]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[16]  P. Jacquet,et al.  Securing the OLSR protocol , 2003 .

[17]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .

[18]  Sondre Wabakken Engell Securing the OLSR Protocol , 2004 .

[19]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[20]  K. J. Ray Liu,et al.  HADOF: defense against routing disruptions in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[22]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[23]  Enrique Alba,et al.  Intelligent OLSR Routing Protocol Optimization for VANETs , 2012, IEEE Transactions on Vehicular Technology.

[24]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[25]  Rutvij H. Jhaveri,et al.  A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.

[26]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[27]  Ilango Krishnamurthi,et al.  Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..

[28]  Soufiene Djahel,et al.  An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol , 2008, 2008 IEEE International Conference on Communications.

[29]  Paul Mühlethaler,et al.  An advanced signature system for OLSR , 2004, SASN '04.

[30]  Asaf Shabtai,et al.  Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes , 2016, IEEE Transactions on Mobile Computing.

[31]  Majid Iqbal Khan,et al.  A Comparative Performance Analysis of MANET Routing Protocols under Security Attacks , 2015 .

[32]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[33]  Ankit D. Patel,et al.  Dual Security Against Grayhole Attack in MANETs , 2015 .