Intelligent honeypot agent for blackhole attack detection in Wireless Mesh Networks

Wireless Mesh Networking (WMN), the static mesh routers (MRs) cooperatively relay each other packets to the Internet Gateway (IGW). The routing protocols assume all the nodes in the network to be non-malicious. However, the open architecture of WMNs paves way to malicious attackers who can exploit hidden loopholes in the routing protocol. In this paper, we mainly focus on the vulnerability of the network to a suction attack called blackhole attack. In detecting such attacks, we explore the use of intelligent agents called Honeypots which are roaming virtual software agents that generate a dummy Route Request (RREQ) packets to lure and trap blackhole attackers. We illustrate the performance of our proposed detection approach by extensive simulation results using the ns-2 simulator.

[1]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[2]  Rami G. Melhem,et al.  Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks , 2006, J. Parallel Distributed Comput..

[3]  Jean-Pierre Hubaux,et al.  Securing wireless mesh networks , 2006, IEEE Wireless Communications.

[4]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[5]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[6]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[7]  Lance Spitzner,et al.  The Honeynet Project: Trapping the Hackers , 2003, IEEE Secur. Priv..

[8]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[9]  Zdravko Karakehayov,et al.  Security - Lifetime tradeoffs for wireless sensor networks , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).

[10]  Nagesh Nandiraju,et al.  Wireless Mesh Networks: Current Challenges and Future Directions of Web-In-The-Sky , 2007, IEEE Wireless Communications.

[11]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[12]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[13]  D.P. Agrawal,et al.  A Perceptron Based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).

[14]  Dharma P. Agrawal,et al.  Security enhancements in AODV protocol for wireless ad hoc networks , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[15]  Dharma P. Agrawal,et al.  Ad Hoc and Sensor Networks: Theory and Applications , 2006 .

[16]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.