Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks

In mobile ad hoc networks (MANETs), denial of service (DoS) attacks not only consume the scarce system resources, such as bandwidth, battery energy, or CPU cycles, but also isolate legitimate users from a network. Therefore, DoS attacks may impact the network connectivity seriously and may further undermine the networking functions, such as control and data message delivery. In this paper, we will present a deep insight into DoS attacks and their impacts on MANETs. First, we analyze the node isolation problem resulting from DoS attacks and derive the probability of node isolation, which shows that the DoS attack exploiting fraudulent routing messages, such as BlackHole attack, impacts the connectivity much severer than other attacks. Second, we notice that the node mobility and potential attack propagation have hardly been considered in the previous DoS attack studies; therefore, we introduce a dynamic DoS attack in this paper. The dynamic DoS attack is characterized in exploiting the node mobility, dynamic power control, and compromised nodes to spread new DoS attacks dynamically. Further, we provide an analytical study on the properties of this new DoS attack, and explain its potential devastating impact on the connectivity of MANETs

[1]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[2]  William H. Sanders,et al.  Model-based validation of an intrusion-tolerant information system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..

[3]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[4]  Jarmo V. E. Mölsä Increasing the DoS attack resiliency in military ad hoc networks , 2005 .

[5]  Xiaoyan Hong,et al.  A secure ad-hoc routing approach using localized self-healing communities , 2005, MobiHoc '05.

[6]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[7]  W. Nelson Statistical Methods for Reliability Data , 1998 .

[8]  Qijun Gu,et al.  Defending against packet injection attacks unreliable ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[9]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[10]  J. Bert Keats,et al.  Statistical Methods for Reliability Data , 1999 .

[11]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[13]  John S. Baras,et al.  Cross-layer attacks in wireless ad hoc networks 1 , 2004 .

[14]  Shugong Xu,et al.  Revealing the problems with 802.11 medium access control protocol in multi-hop wireless ad hoc networks , 2002, Comput. Networks.

[15]  David Moore,et al.  Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.

[16]  Wenye Wang,et al.  Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes , 2006, 2006 IEEE International Conference on Communications.

[17]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[18]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[19]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[20]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[21]  Guevara Noubir,et al.  On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..