A Localized Architecture for Detecting Denial of Service (DoS) Attacks in Wireless AD Hoc Networks

In this paper we propose a reputation-based incentive scheme for detecting DoS attacks that target the network layer services. The scheme is based on clustering architecture to provide localized and scalable solutions. It involves a node history-based reputation update mechanism where more weights are given to the most recent reputation values. Load balancing feature was introduced to reduce the forwarding overhead on cooperative nodes. We evaluated the performance of the proposed scheme using simulation experiments. We studied a network with selfish nodes where the attack involves dropping packets. The effect of dropping control and data packets is investigated with and without load balancing. The results indicated that localized reputation-based incentive solutions can significantly increase packet delivery ratio in the presence of selfish nodes with limited communication and packet processing overheads.

[1]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[2]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[3]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[4]  Aleksandar Kuzmanovic,et al.  Low-rate TCP-targeted denial of service attacks and counter strategies , 2003, IEEE/ACM Transactions on Networking.

[5]  Pietro Michiardi,et al.  Making greed work in mobile ad hoc networks , 2002 .

[6]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[8]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[9]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[10]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[11]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[12]  Bharat K. Bhargava,et al.  Detecting Service Violations and DoS Attacks , 2003, NDSS.

[13]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[14]  Mieso K. Denko A reputation-based service differentiation scheme for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[15]  Evangelos Kranakis,et al.  Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks , 2003, ADHOC-NOW.