Colluding injected attack in mobile ad-hoc networks

The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) and machine-to-machine (M2M) popular research topics recently. With more attention on M2M and MANETs lately, the security issues become more important and urgent for managing and deploying in such networks. The flexible deployment nature and the lack of fixed infrastructure make MANETs suffer from varieties of security attacks. In this paper, we show how an adversary can utilize a colluding attack in MANET by injecting malicious nodes in the network, while hiding their identities from other legitimate nodes. We will name this attack as the Colluding Injected Attack (CIA). These injected nodes will work together to generate a severe attack in the network, which aims to create a collision at an arbitrary node, which in turn will result in making the attacked node unable to receive or relay any packet. As a result this node could be wrongly reported as having a malicious behavior by any other node in the same neighborhood, or it might be reported as unreachable if it is a destination node. Our simulation results show that the existence of an adversary that launching the colluding injected attack (CIA) will mislead the decision of previous attack detection schemes.

[1]  Amitabh Mishra,et al.  Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.

[2]  Juan-Carlos Cano,et al.  Analysis of the interaction between TCP variants and routing protocols in MANETs , 2005, 2005 International Conference on Parallel Processing Workshops (ICPPW'05).

[3]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[4]  Donald F. Towsley,et al.  Secure Wireless Communication with Dynamic Secrets , 2010, 2010 Proceedings IEEE INFOCOM.

[5]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[6]  Sidi-Mohammed Senouci,et al.  Effect of Ad Hoc Routing Protocols on TCP Performance within MANETs , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[7]  Eui-nam Huh,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[8]  Quanli Wei,et al.  The Design and Implementation of the Minimal M2M Terminal Based on the SIM4100 Wireless Module , 2010, 2010 Third International Symposium on Information Processing.

[9]  Tharam S. Dillon,et al.  A Secure Key Management Model for Wireless Mesh Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[10]  Levente Buttyán,et al.  Modelling adversaries and security objectives for routing protocols in wireless sensor networks , 2006, SASN '06.

[11]  M. Dohler,et al.  Secure Lossless Aggregation for Smart Grid M2M Networks , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[12]  Wen Li,et al.  Design of M2M Platform Based on J2EE and SOA , 2010, 2010 International Conference on E-Business and E-Government.

[13]  Virgil D. Gligor Handling New Adversaries in Secure Mobile Ad-Hoc Networks , 2007 .

[14]  Katarzyna Kosek,et al.  Problems with Providing QoS in EDCA Ad-Hoc Networks with Hidden and Exposed Nodes , 2009, IEEE INFOCOM Workshops 2009.

[15]  Issa M. Khalil MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[16]  Tatjana Predojev,et al.  Energy-delay tradeoff analysis in embedded M2M networks with channel coding , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[17]  Jean-Pierre Hubaux,et al.  Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues , 2002, MobiCom '02.

[18]  Ki-Hyung Kim,et al.  Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks , 2008, 2008 New Technologies, Mobility and Security.

[19]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[20]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[21]  Issa M. Khalil,et al.  DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[22]  Shiann-Tsong Sheu,et al.  Grouping strategy for solving hidden node problem in IEEE 802.15.4 LR-WPAN , 2005, First International Conference on Wireless Internet (WICON'05).