Hardware assisted misbehaving nodes detection in mobile ad hoc networks

The mobility feature leads to the proliferation of wireless networks. Among all kinds of wireless networks, the peer-to-peer nature of Mobile Ad hoc Networks (MANET) makes such networks very promising. Unlike traditional wired networks, MANETs do not need infrastructure to work properly. The most commonly used routing protocols for mobile ad hoc networks do not take into consideration security, assuming all the mobile nodes will coordinate with each other. Such routing protocols along with the absence of infrastructure make MANETs prone to a variety of faults such as packet dropping, packet misrouting, etc. This dissertation addresses the security issues of MANET by presenting the hardware assisted misbehaving nodes detection. In such a scheme, the hardware is responsible for detecting the misbehaving nodes. The detection results are sent to software layer of mobile nodes. Upon receiving the detection results, the software layer can exclude the misbehaving nodes from the networks. This dissertation presents two hardware detection schemes. Two-timer is a low-cost detection scheme. There are only two timers utilized in the scheme. The two-timer scheme can be used to detect simple packet dropping with good detection performance. The other detection scheme, cache scheme, can detect both packet dropping and packet misrouting. The cache scheme needs more resource than the two-timer scheme along with better detection performance.

[1]  Sirisha Medidi,et al.  Distinguishing congestion from malicious behavior in mobile ad-hoc networks , 2004, SPIE Defense + Commercial Sensing.

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[4]  Rajendra V. Boppana,et al.  A comparison of TCP performance over three routing protocols for mobile ad hoc networks , 2001, MobiHoc.

[5]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[6]  Srivaths Ravi,et al.  Embedding security in wireless embedded systems , 2003, 16th International Conference on VLSI Design, 2003. Proceedings..

[7]  Charles E. Perkins,et al.  Mobile Networking Through Mobile IP , 1998, IEEE Internet Comput..

[8]  Nitin H. Vaidya,et al.  Analysis of TCP Performance over Mobile Ad Hoc Networks , 1999, Wirel. Networks.

[9]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[10]  Walid Dabbous,et al.  On TCP performance in a heterogeneous network: a survey , 2000, IEEE Commun. Mag..

[11]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[12]  Dharma P. Agrawal,et al.  A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[13]  George Kesidis,et al.  Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[14]  Petri Mähönen,et al.  TCP performance issues over wireless links , 2001, IEEE Commun. Mag..

[15]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[16]  José G. Delgado-Frias,et al.  Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks , 2007, 2007 15th IEEE International Conference on Networks.

[17]  M. Jiang,et al.  Cluster based routing protocol (CBRP) , 1999 .

[18]  C C. Chiang,et al.  Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .

[19]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[20]  Jean C. Walrand,et al.  High-performance communication networks , 1999 .

[21]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[22]  J. J. Garcia-Luna-Aceves,et al.  An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..

[23]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[24]  Sirisha Medidi,et al.  Detecting packet-dropping faults in mobile ad-hoc networks , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.

[25]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[26]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[27]  Xin Yu,et al.  Improving TCP performance over mobile ad hoc networks by exploiting cross-layer information awareness , 2004, MobiCom '04.

[28]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[29]  Jin Ding,et al.  Communication protocols for wireless ad-hoc and sensor networks , 2006 .

[30]  Sirisha Medidi,et al.  Detecting Packet Mishandling in MANETs , 2004, Security and Management.

[31]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[32]  Heejo Lee,et al.  On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[33]  Sirisha Medidi,et al.  Malicious node detection in ad-hoc wireless networks , 2003, SPIE Defense + Commercial Sensing.

[34]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[35]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[36]  Shyhtsun Felix Wu,et al.  Malicious packet dropping: how it might impact the TCP performance and how we can detect it , 2000, Proceedings 2000 International Conference on Network Protocols.

[37]  Srivaths Ravi,et al.  Tamper resistance mechanisms for secure embedded systems , 2004, 17th International Conference on VLSI Design. Proceedings..

[38]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[39]  Zeng Ying Intrusion Detection in Wireless Ad Hoc Network , 2005 .

[40]  Dirk Westhoff,et al.  Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[41]  Dave Maltz,et al.  Flow State in the Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2001 .

[42]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.