Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks

Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of the packets it receives but drops the others. In wireless networks, it is particularly hard to detect the presence of such attackers because a packet loss over the wireless link can be due to bad channel quality, medium access collisions, or intentional dropping. In contrast to existing studies, we propose a more practical algorithm known as channel aware detection (CAD) that adopts two strategies, hop-by-hop loss observation and traffic overhearing, to detect the mesh nodes subject to the attack. We derive the optimal detection thresholds by analyzing the false alarm and missed detection probabilities of CAD. We also compare our approach to existing solutions and demonstrate that CAD detects the attackers effectively even in harsh channel conditions.

[1]  Anthony Ephremides,et al.  Wireless networking , 1997, Proceedings Second IEEE Symposium on Computer and Communications.

[2]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[3]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[4]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[5]  Reza Curtmola,et al.  Secure multicast routing in wireless networks , 2007, MOCO.

[6]  Chunming Rong,et al.  Security Attacks in Ad Hoc, Sensor and Mesh Networks , 2009 .

[7]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Hongqiang Zhai,et al.  How well can the IEEE 802.11 wireless LAN support quality of service? , 2005, IEEE Transactions on Wireless Communications.

[10]  Reza Curtmola,et al.  BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks , 2007, IEEE Transactions on Mobile Computing.

[11]  J. Woods,et al.  Probability and Random Processes with Applications to Signal Processing , 2001 .

[12]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.