Masquerading Attacks Detection in Mobile Ad Hoc Networks

Due to the lack of centralized identity management and the broadcast nature, wireless ad hoc networks are always a palatable target for masquerading attacks. The attackers can spoof identities of privileged legitimate users for various malicious reasons, such as to launch DoS or DDoS attacks, to access unauthorized information, and to evade the detection and accountability. In the current and limited literature, masquerading attacks are mostly counteracted by signal-strength-based detection systems. However, these schemes are mostly proposed to work for infrastructure-based IEEE 802.11 wireless networks using fixed access points, air monitors, or fixed anchor nodes, which are not suitable for the ad hoc architecture. In this paper, we propose a detection system for masquerading attacks without using fixed anchor nodes or air monitors. We develop an anomaly detection model based on the statistical significant testing for our masquerading detection system that takes into consideration the signal strength fluctuation. We conduct a test bed of Samsung Galaxy-based smartphones in order to analyze the real-world signal strength variation. We also plug the real-world signal strength variation in our model for the evaluation of the detection accuracy. We propose the received signal-strength-based masquerading attack detection scheme, which is carried out first by each node in its one-hop vicinity and then extended to five-hop proximity for broader detection scope and improved accuracy. The proposed scheme is evaluated using an NS-2 network simulator for detection accuracy in different environments. The results obtained indicate that our proposed scheme produces more than 90% true positives.

[1]  Jeng-Farn Lee,et al.  TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.

[2]  Santiago Eibe,et al.  Clustering-based location in wireless networks , 2010, Expert Syst. Appl..

[3]  Hyun Myung,et al.  Development of Algal Bloom Removal System Using Unmanned Aerial Vehicle and Surface Vehicle , 2017, IEEE Access.

[4]  Swarun Kumar,et al.  Guaranteeing spoof-resilient multi-robot networks , 2015, Auton. Robots.

[5]  Chinnappan Jayakumar,et al.  Trust based authentication technique for cluster based vehicular ad hoc networks (VANET) , 2018, Wirel. Networks.

[6]  Mohammad Faisal,et al.  Identity attack detection system for 802.11-based ad hoc networks , 2018, EURASIP J. Wirel. Commun. Netw..

[7]  Geert Leus,et al.  Robust Differential Received Signal Strength-Based Localization , 2017, IEEE Transactions on Signal Processing.

[8]  Madjid Merabti,et al.  Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.

[9]  Yang Liu,et al.  Opportunistic Coexistence of LTE and WiFi for Future 5G System: Experimental Performance Evaluation and Analysis , 2018, IEEE Access.

[10]  M. Salazar-Palma,et al.  A survey of various propagation models for mobile communication , 2003 .

[11]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[12]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[13]  John M. Brooke,et al.  Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.

[14]  John M. Brooke,et al.  Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[15]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[16]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[17]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[18]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[19]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[20]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[21]  Robert V. Brill,et al.  Applied Statistics and Probability for Engineers , 2004, Technometrics.

[23]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[24]  Calvin C. Newport,et al.  Who are you? Secure identities in single hop ad hoc networks , 2016, Distributed Computing.

[25]  Dirk Grunwald,et al.  A Survey of Wireless Path Loss Prediction and Coverage Mapping Methods , 2013, IEEE Communications Surveys & Tutorials.

[26]  Jie Yang,et al.  Detecting Spoofing Attacks in Mobile Wireless Environments , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[27]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[28]  Youakim Badr,et al.  Internet of Medical Things: A Review of Recent Contributions Dealing With Cyber-Physical Systems in Medicine , 2018, IEEE Internet of Things Journal.

[29]  Eunsoo Kim,et al.  A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics , 2016, 2016 International Conference on Software Security and Assurance (ICSSA).

[30]  S. Keshav,et al.  Practical security for disconnected nodes , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[31]  Chin-Teng Lin,et al.  Internet of Vehicles: Motivation, Layered Architecture, Network Model, Challenges, and Future Aspects , 2016, IEEE Access.

[32]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[33]  Jemal H. Abawajy,et al.  Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System , 2017, IEEE Communications Magazine.

[34]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[35]  Soumyadev Maity,et al.  Self-organized public key management in MANETs with enhanced security and without certificate-chains , 2014, Comput. Networks.

[36]  Guang Gong,et al.  Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation , 2006 .

[37]  Kamel Adi,et al.  Efficient certificateless web-of-trust model for public-key authentication in MANET , 2015, Comput. Commun..

[38]  D. Llewellyn-Jones,et al.  Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks , 2009, 2009 Second International Conference on Developments in eSystems Engineering.

[39]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[40]  Henri Nurminen,et al.  A Survey on Wireless Transmitter Localization Using Signal Strength Measurements , 2017, Wirel. Commun. Mob. Comput..

[41]  Mohammad S. Obaidat,et al.  Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[42]  Markus Jakobsson,et al.  Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.