An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks

Wireless Mesh Networks (WMNs) have potentially unlimited applications in the future. Therefore, establishing a viable and secure wireless network routing protocol for these networks is essential. Currently, these networks are being used in connecting large sections of cities by setting up wireless routers at strategic points all around the city. These networks can also support connecting remote areas of the country, instead of having to lay a cable all the way. The nature of applications mentioned above make these networks prone to different attacks. Thus, security of these networks is a serious concern. In this paper, we study the impact of Distributed Denial of Service (DDoS) attacks on WMNs. We base our work on the existing Optimized Link State Routing protocol (OLSR) and we weave in concepts of Learning Automata (LA) to protect the network from this kind of attack. The simulation results for the proposed scheme show that the proposed protocol is effective in the prevention of DDoS attacks in WMNs.

[1]  Sudip Misra,et al.  Routing Bandwidth-Guaranteed Paths in MPLS Traffic Engineering: A Multiple Race Track Learning Approach , 2007, IEEE Transactions on Computers.

[2]  Geert Deconinck,et al.  An overlay protection layer against Denial-of-Service attacks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[3]  Vivek Tiwari,et al.  Lacas: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks , 2009, IEEE Journal on Selected Areas in Communications.

[4]  Azzedine Boukerche,et al.  A Self-X Approach for OLSR Routing Protocol in Large-Scale Wireless Mesh Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[5]  Vyas Sekar,et al.  Analyzing large DDoS attacks using multiple data sources , 2006, LSAD '06.

[6]  B. John Oommen,et al.  Dynamic algorithms for the shortest path routing problem: learning automata-based solutions , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[7]  B. John Oommen,et al.  Cybernetics and Learning Automata , 2009, Handbook of Automation.

[8]  Thomas M. Breuel,et al.  High performance traffic shaping for DDoS mitigation , 2008, CoNEXT '08.

[9]  Vrizlynn L. L. Thing,et al.  Non-intrusive IP traceback for DDoS attacks , 2007, ASIACCS '07.

[10]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[11]  B. John Oommen,et al.  An efficient dynamic algorithm for maintaining all-pairs shortest paths in stochastic networks , 2006, IEEE Transactions on Computers.

[12]  B. John Oommen,et al.  GPSPA: a new adaptive algorithm for maintaining shortest path routing trees in stochastic networks , 2004, Int. J. Commun. Syst..

[13]  Petros Nicopolitidis,et al.  Using learning automata for adaptive push-based data broadcasting in asymmetric wireless environments , 2002, IEEE Trans. Veh. Technol..

[14]  Mohammad Reza Meybodi,et al.  Learning automata based dynamic guard channel algorithms , 2011, Comput. Electr. Eng..

[15]  S.A. Khan,et al.  Efficient placement of sensors for detection against distributed denial of service attack , 2008, 2008 International Conference on Innovations in Information Technology.

[16]  Wei Lu,et al.  An unsupervised approach for detecting DDOS attacks based on traffic-based metrics , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..

[17]  Vijay Varadharajan,et al.  DoSTRACK: a system for defending against DoS attacks , 2009, SAC '09.

[18]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[19]  P. Venkata Krishna,et al.  LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks , 2009, Secur. Commun. Networks.

[20]  G.I. Papadimitriou,et al.  Self-adaptive TDMA protocols for WDM star networks: a learning-automata-based approach , 1999, IEEE Photonics Technology Letters.

[21]  Mohammad Reza Meybodi,et al.  Data aggregation in sensor networks using learning automata , 2010, Wirel. Networks.

[22]  Yanwei Wu,et al.  Stochastic Security in Wireless Mesh Networks via Saddle Routing Policy , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).

[23]  B. John Oommen,et al.  Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[24]  B. B. Gupta,et al.  An efficient analytical solution to thwart DDoS attacks in public domain , 2009, ICAC3 '09.

[25]  Georgios I. Papadimitriou,et al.  Learning automata-based receiver conflict avoidance algorithms for WDM broadcast-and-select star networks , 1996, TNET.

[26]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[27]  Jonathan Wellons,et al.  Oblivious Routing for Wireless Mesh Networks , 2008, 2008 IEEE International Conference on Communications.

[28]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[29]  M. L. Dhore,et al.  Detection of DDoS attack and defense against IP spoofing , 2009, ICAC3 '09.

[30]  Petros Nicopolitidis,et al.  Learning automata-based polling protocols for wireless LANs , 2003, IEEE Trans. Commun..