13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g<strong>in</strong> Wireless Ad Hoc NetworksMike Just 1 , Evangelos Kranakis 2,⋆ ,andTaoWan 2,⋆⋆1 Treasury Board of Canada, Secretariat, 2745 Iris St., Ottawa, ON, K1A 0R5, Canada2 School of <strong>Computer</strong> <strong>Science</strong>, Carleton University, Ottawa, ON, K1S 5B6, CanadaAbstract. Most of the rout<strong>in</strong>g protocols <strong>in</strong> wireless ad hoc networks, such asDSR, assume nodes are trustworthy and cooperative. This assumption renderswireless ad hoc networks vulnerable to various types of Denial of Service (DoS)attacks. We present a distributed prob<strong>in</strong>g technique to detect and mitigate onetype of DoS attacks, namely malicious packet dropp<strong>in</strong>g, <strong>in</strong> wireless ad hoc networks.A malicious node can promise to forward packets but <strong>in</strong> fact fails to doso. In our distributed prob<strong>in</strong>g technique, every node <strong>in</strong> the network will probe theother nodes periodically to detect if any of them fail to perform the forward<strong>in</strong>gfunction. Subsequently, node state <strong>in</strong>formation can be utilized <strong>by</strong> the rout<strong>in</strong>g protocolto <strong>by</strong>pass those malicious nodes. Our experiments show that <strong>in</strong> a moderatelychang<strong>in</strong>g network, the prob<strong>in</strong>g technique can detect most of the malicious nodeswith a relatively low false positive rate. The packet delivery rate <strong>in</strong> the networkcan also be <strong>in</strong>creased accord<strong>in</strong>gly.Keywords: Security, Denial of Service (DoS), Wireless Ad Hoc Networks, DistributedProb<strong>in</strong>g, Secure Rout<strong>in</strong>g Protocols.1 IntroductionA wireless or mobile ad hoc network (MANET) is formed <strong>by</strong> a group of wireless nodeswhich agree to forward packets for each other. One assumption made <strong>by</strong> most ad hocrout<strong>in</strong>g protocols [16, 21] is that every node is trustworthy and cooperative. In otherwords, if a node claims it can reach another node <strong>by</strong> a certa<strong>in</strong> path or distance, the claimis trusted. If a node reports a l<strong>in</strong>k break, the l<strong>in</strong>k will no longer be used. Although suchan assumption can simplify the design and implementation of ad hoc rout<strong>in</strong>g protocols,it does make ad hoc networks vulnerable to various types of denial of service (DoS)attacks, which are discussed <strong>in</strong> detail <strong>in</strong> Section 2. One class of DoS attacks is maliciouspacket dropp<strong>in</strong>g. A malicious node can silently drop some or all of the data packets sentto it for further forward<strong>in</strong>g even when no congestion occurs.Malicious packet dropp<strong>in</strong>g attack presents a new threat to wireless ad hoc networkss<strong>in</strong>ce they lack physical protection and strong access control mechanism. An adversary⋆ Research supported <strong>in</strong> part <strong>by</strong> NSERC (Natural <strong>Science</strong>s and Eng<strong>in</strong>eer<strong>in</strong>g Research Councilof Canada) and MITACS (Mathematics of Information Technology and Complex Systems)grants.⋆⋆ Research supported <strong>in</strong> part <strong>by</strong> OCIPEP (Office of Critical Infrastructure Protection and EmergencyPreparedness) Research Fellowship.S. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 151–163, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!