Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc Networks

Optimizations in wireless ad-hoc network control protocols, such as shortest path routing and reduced topology set operations, are widely employed and recognized to decrease overhead and improve performance in benign conditions. Such optimizations, however, result in vulnerabilities that can decrease the robustness of the network when misconfigured, and can be readily exploited under various adversarial models. In this paper, we study the effects of such optimizations in the presence of misconfiguration and attacks, and we propose an Attack-Resistant Routing (ARR) framework that mitigates adversarial effects. While many other methods of combating certain control plane attacks have been proposed, our method is unique in that it assumes no prior knowledge of the mechanisms used to effect the attacks and the type of misinformation affecting the network. Rather, it alleviates the vulnerabilities introduced by various optimizations, thus increasing network robustness when the network is under attack or misconfigured. We show that ARR can withstand multiple and severe attacks and restore network performance to levels close to normal.

[1]  C. Politis,et al.  A Test-bed Implementation for Securing Olsr in Mobile Ad-hoc Networks , 2010 .

[2]  Kwok-Yan Lam,et al.  SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.

[3]  David Thaler,et al.  Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.

[4]  Bharat Bhargava,et al.  Defending against Collaborative Packet Drop Attacks on MANETs , 2009 .

[5]  Robert G. Prinz,et al.  Optimal multi-topology routing for IP resilience , 2006 .

[6]  Andrew Adams,et al.  Protocol Independent Multicast - Dense Mode (PIM-DM): Protocol Specification (Revised) , 2005, RFC.

[7]  Richard G. Ogier,et al.  Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding , 2009, RFC.

[8]  Thomas H. Clausen,et al.  Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP) , 2011, RFC.

[9]  Deep Medhi,et al.  Using Multi-Topology Routing to improve routing during geographically correlated failures , 2014, 2014 10th International Conference on the Design of Reliable Communication Networks (DRCN).

[10]  Abhay Roy,et al.  Multi-Topology (MT) Routing in OSPF , 2007, RFC.

[11]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[12]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[13]  Todd R. Andel,et al.  Surveying security analysis techniques in manet routing protocols , 2007, IEEE Communications Surveys & Tutorials.

[14]  Gary Scott Malkin,et al.  RIP Version 2 , 1998, RFC.

[15]  Bu-Sung Lee,et al.  CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS , 2010, Comput. Networks.

[16]  J.P. Macker,et al.  Simplified multicast forwarding in mobile ad hoc networks , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[17]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[18]  Shyhtsun Felix Wu,et al.  On the vulnerabilities and protection of OSPF routing protocol , 1998, Proceedings 7th International Conference on Computer Communications and Networks (Cat. No.98EX226).

[19]  Jon Andersson,et al.  Multi-topology routing for improved network resource utilization in mobile tactical networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[20]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[21]  Tarik Cicic On basic properties of fault-tolerant multi-topology routing , 2008, Comput. Networks.

[22]  A. Hansen,et al.  Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks , 2006 .

[23]  Christos Politis,et al.  A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks , 2010, ArXiv.

[24]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[25]  Thomas H. Clausen,et al.  Optimized Link State Routing Protocol Version 2 (OLSRv2) and MANET Neighborhood Discovery Protocol (NHDP) Extension TLVs , 2014, RFC.

[26]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[27]  P. Jacquet,et al.  Securing the OLSR protocol , 2003 .

[28]  Stein Gjessing,et al.  Fast IP Network Recovery Using Multiple Routing Configurations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[29]  Philippe Jacquet,et al.  OSPF Multipoint Relay (MPR) Extension for Ad Hoc Networks , 2009, RFC.

[30]  S. Gjessing,et al.  Multiple Routing Configurations for Fast IP Network Recovery , 2009, IEEE/ACM Transactions on Networking.

[31]  M. Menth,et al.  Network resilience through multi-topology routing , 2005, DRCN 2005). Proceedings.5th International Workshop on Design of Reliable Communication Networks, 2005..

[32]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[33]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[34]  Rafael Timóteo de Sousa Júnior,et al.  Autonomic trust reasoning enables misbehavior detection in OLSR , 2008, SAC '08.

[35]  Ritu Chadha,et al.  Reliability estimation in mobile ad hoc networks , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).