Detecting Forged Acknowledgements in MANETs

Over the past few years, with the trend of mobile computing, Mobile Ad hoc Network (MANET) has become one of the most important wireless communication mechanisms among all. Unlike traditional network, MANET does not have a fixed infrastructure, every single node in the network works as both a receiver and a transmitter. Nodes directly communicate with each other when they are both within their communication ranges. Otherwise, they rely on their neighbors to store and forward packets. As MANET does not require any fixed infrastructure and it is capable of self configuring, these unique characteristics made MANET ideal to be deployed in a remote or mission critical area like military use or remote exploration. However, the open medium and wide distribution of nodes in MANET leave it vulnerable to various means of attacks. It is crucial to develop suitable intrusion detection scheme to protect MANET from malicious attackers. In our previous research, we have proposed a mechanism called Enhanced Adaptive Acknowledgement (EAACK) scheme. Nevertheless, it suffers from the threat that it fails to detect misbehaving node when the attackers are smart enough to forge the acknowledgement packets. In this paper, we introduce Digital Signature Algorithm (DSA) into the EAACK scheme, and investigate the performance of DSA in MANET. The purpose of this paper is to present an improved version of EAACK called EAACK2 that performs better in the presence of false misbehavior and partial dropping.

[1]  Markus Jakobsson,et al.  A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.

[2]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[3]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[4]  Tarek R. Sheltami,et al.  Detecting misbehaving nodes in MANETs , 2010, iiWAS.

[5]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[6]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[7]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Ashraf S. Hasan Mahmoud,et al.  Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.

[12]  Yuguang Fang,et al.  A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .

[13]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[14]  J.-Y. Le Boudec,et al.  Toward self-organized mobile ad hoc networks: the terminodes project , 2001, IEEE Commun. Mag..

[15]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[16]  J. Broch,et al.  Dynamic source routing in ad hoc wireless networks , 1998 .

[17]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[18]  Mihaela Cardei,et al.  Routing Security in Ad Hoc Wireless Networks , 2010 .

[19]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[20]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[22]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[23]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.