A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless Networks

Wireless networks have emerged as a key enabling technology, expanding rapidly and offers numerous potential applications. The security issues have to be adequately addressed to realize the potential of multi-hop cooperative wireless network scenarios. The open nature of the wireless network is the opportunity for invaders launching various attacks with minimum effort owing to the multi-hop scenario of routing protocols. Routing protocols work based on the assumption that intermediate nodes are cooperating and well-behaving. Even in the presence of strong authentication mechanisms, detecting the continuous and selective packet dropping attack is a challenging process. This paper focuses on the design of a secure routing framework, and extend it to the routing protocols of various multi-hop wireless networks vulnerable to such attacks. The proposed hybrid security framework combats the routing misbehavior attacks in the presence of a wide range of malicious nodes. The proposed framework extends the hybrid security model adaptable to various multi-hop wireless networks with flexible routing overhead. The framework introduces a dummy packet based acknowledgment scheme that inserts dummy packets in the real payload traffic and masks the dummy traffic sequence through the dynamic traffic pattern. It optimizes the dummy packet generation based on the packet drop experienced and minimized the dummy traffic to balance the routing security and overhead. It confirms the presence of malicious nodes based on the dummy packet dropping and relies on the trust mechanism to eliminate the misbehaving nodes in the critical path. The use of subjective and fuzzy trust model validates the accuracy of uncertain evidence and contextual factors in the trust. The effectiveness of the framework is realized by applying it on various routing protocols in wireless networks. The performance evaluation confirms excellent packet delivery of the proposed hybrid framework over various networks in a highly vulnerable environment.

[1]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[2]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[3]  Kamalrulnizam Abu Bakar,et al.  A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network , 2016, Mob. Networks Appl..

[4]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[5]  José Luis Salazar,et al.  Secure Trust Management with Source Routing Protocol for MANETs , 2015, Netw. Protoc. Algorithms.

[6]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[8]  J. Martin Leo Manickam,et al.  Two-Way Acknowledgment-Based Trust Framework for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[9]  Bharat Bhushan,et al.  Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..

[10]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[11]  Edwin Hsing-Mean Sha,et al.  Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.

[12]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[13]  Sunil Kumar Jangir,et al.  Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks , 2016, ICTCS '16.

[14]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.

[15]  Yuanming Wu,et al.  Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN , 2014 .

[16]  GuHsin Lai Detection of wormhole attacks on IPv6 mobility-based wireless sensor network , 2016, EURASIP J. Wirel. Commun. Netw..

[17]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[18]  Yu Zhang,et al.  AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.

[19]  David E. Culler,et al.  Challenging the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL): A Survey , 2017, IEEE Communications Surveys & Tutorials.

[20]  Krishna Kant,et al.  Generalized Trust Model for Cooperative Routing in MANETs , 2017, Wirel. Pers. Commun..

[21]  B. B. Gupta,et al.  Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.

[22]  Remi Badonnel,et al.  A Taxonomy of Attacks in RPL-based Internet of Things , 2016, Int. J. Netw. Secur..

[23]  Thomas H. Clausen,et al.  Lightweight On-demand Ad hoc Distance-vector Routing - Next Generation (LOADng): Protocol, extension, and applicability , 2017, Comput. Networks.

[24]  Balwinder Singh Dhaliwal,et al.  Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks , 2016 .

[25]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[26]  Winston Khoon Guan Seah,et al.  Cooperation stimulation mechanisms for wireless multihop networks: A survey , 2015, J. Netw. Comput. Appl..

[27]  R. M. Chandrasekaran,et al.  RANDOM DUMMY PACKET DISTRIBUTION APPROACH FOR DETECTION OF ROUTING MISBEHAVIOR IN MOBILE AD HOC NETWORK , 2012 .

[28]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[29]  Kamalrulnizam Abu Bakar,et al.  A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks , 2014, Frontiers of Computer Science.

[30]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[31]  Sayan Kumar Ray,et al.  A Lightweight Trust Design for IoT Routing , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[32]  B. Latha,et al.  HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks , 2017, Cluster Computing.

[33]  Gang Qu,et al.  Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs , 2013, Int. J. Distributed Sens. Networks.

[34]  Jonathan Loo,et al.  The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks , 2013, IEEE Sensors Journal.

[35]  Marjan Kuchaki Rafsanjani,et al.  FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs , 2015 .

[36]  Young-Bae Ko,et al.  Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks , 2016, Secur. Commun. Networks.

[37]  Kevin Weekly,et al.  Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[38]  Kausa Aghera,et al.  MMR-LEACH: Multi-tier Multi-hop Routing in LEACH Protocol , 2017 .

[39]  Vijay Varadharajan,et al.  Subjective logic based trust model for mobile ad hoc networks , 2008, SecureComm.

[40]  Khaled Daabaj,et al.  Adaptive ACK: A novel intrusion detection system to mitigate intended packet dropping in MANETs , 2010 .

[41]  Marwan Krunz,et al.  Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.

[42]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[43]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[44]  Zhiping Jia,et al.  A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.