DOI QR코드

DOI QR Code

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa (Department of Computer Science and Engineering, Easwari Engineering College, Anna University) ;
  • Kannan, Kathiravan (Department of Computer Science and Engineering, Easwari Engineering College, Anna University)
  • Received : 2014.08.24
  • Accepted : 2015.08.21
  • Published : 2015.12.01

Abstract

Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

Keywords

References

  1. K. Obraczka and G. Tsuiuk, "Multicast Routing Issues in Ad Hoc Networks," IEEE Int. Conf. Universal Pers. Commun., Florence, Italy, vol. 1, Oct. 5-9, 1998, pp. 751-756.
  2. H.L. Nguyen and U.T. Nguyen, "A Study of Different Attacks on Multicast in Mobile Ad Hoc Networks," Ad Hoc Netw., vol. 6, no. 1, Jan. 2008, pp. 32-46. https://doi.org/10.1016/j.adhoc.2006.07.005
  3. J. Dong, R. Curtmola, and C.N. Rotaru, "Secure High-Throughput Multicast Routing in Wireless Mesh Networks," IEEE Trans. Mobile Comput., vol. 10, no. 5, 2011, pp. 653-668. https://doi.org/10.1109/TMC.2010.194
  4. R. Curtmola and C.N. Rotaru, "BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks," IEEE Trans. Mobile Comput., vol. 8, no. 4, 2009, pp. 445-459. https://doi.org/10.1109/TMC.2008.134
  5. A.M.A. Mo'men, H.S. Hamza, and I.A. Saroit, "New Attacks and Efficient Countermeasures for Multicast AODV," HONET, Cairo, Egypt, Dec. 19-21, 2010, pp. 51-57.
  6. A.M.A. Mo'men, H.S. Hamza, and I.A. Saroit, "A Survey on Security Enhanced Multicast Routing Protocols in Mobile Ad Hoc Networks," HONET, Cairo, Egypt, 2010, pp. 262-268.
  7. F. He, K. Hao, and H. Ma, "S-MAODV: A Trust Key Computing Based Secure Multicast Ad Hoc on Demand Vector Routing Protocol," IEEE ICCSIT, Chengdu, China, vol. 6, July 9-11, 2010, pp. 434-438.
  8. S. Roy et al., "Securing MAODV: Attacks and Countermeasures," IEEE SECON, Santa Clara, CA, USA, Sept. 2005, pp. 521-532.
  9. A.A. Mo'men, H.S. Hamza, and I.A. Saroit, "Secure Multicast Routing Protocols in Mobile Ad-Hoc Networks," Int. J. Commun. Syst., vol. 27, no. 11, Nov. 2014, pp. 2808-2831. https://doi.org/10.1002/dac.2508
  10. A.M. Pushpa and K. Kathiravan, "Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks," IEEE GCC, Doha, Qatar, Nov. 17-20, 2013, pp. 245-250.
  11. A.M. Pushpa and K. Kathiravan, "Resilient PUMA (Protocol for Unified Multicasting through Announcement) against Internal Attacks in Mobile Ad Hoc Networks," ICACCI, Mysore, India, Aug. 22-25, 2013, pp. 1906-1912.
  12. I. Khalil and S. Bagchi, "Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure," IEEE Trans. Mobile Comput., vol. 10, no. 8, Aug. 2011, pp. 1096-1112. https://doi.org/10.1109/TMC.2010.249
  13. E. Royer and C. Perkins, "Multicast Ad-Hoc on-Demand Distance Vector (MAODV) Routing," Internet Draft, July 2000.
  14. A.M. Pushpa and K. Kathiravan, "Intelligent Stealthy Attack on MAODV in Mobile Ad Hoc Networks," Int. Conf. Adv. Comput., Chennai, India, Dec. 17-19, 2014, pp.1-6.
  15. P. Mohapatra, C. Gui, and J. Li, "Group Communications in Mobile Ad Hoc Networks," Comput., vol. 37, no. 2, Feb. 2004, pp. 52-59. https://doi.org/10.1109/MC.2004.1266296
  16. H. Gossain et al., "Supporting MAC Layer Multicast in IEEE 802.11-Based MANETs: Issues and Solutions," IEEE Int. Conf. Local Comput. Netw., Tampa, FL, USA, Nov. 2004, pp. 172-179.
  17. S. Kumar, V.S. Raghavan, and J. Deng, "Medium Access Control Protocols for Ad Hoc Wireless Networks: A Survey," Ad Hoc Netw., vol. 4, no. 3, May 2006, pp. 326-358. https://doi.org/10.1016/j.adhoc.2004.10.001
  18. E.M. Royer, S.J. Lee, and C.E. Perkins, "The Effects of MAC Protocols on Ad Hoc Network Communication," IEEE WCNC, Chicago, IL, USA, vol. 2, 2000, pp. 543-548.
  19. Q. Chen et al., "Overhaul of IEEE 802.11 Modeling and Simulation in NS-2," MSWiM, Chania, Greece, 2007, pp. 159-168.
  20. L.K. Law, S.V. Krishnamurthy, and M. Faloutsos, "Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks," IEEE Trans. Mobile Comput., vol. 6, no. 3, 2007, pp. 264-279. https://doi.org/10.1109/TMC.2007.43
  21. F.S. Wattenberg et al., "Anomaly Detection in Network Traffic Based on Statistical Inference and ${\alpha}$-Stable Modeling," IEEE Trans. Dependable Secure Comput., vol. 8, no. 4, July-Aug. 2011, pp. 494-509. https://doi.org/10.1109/TDSC.2011.14
  22. C. O'Reilly et al., "Anomaly Detection in Wireless Sensor Networks in a Non-stationary Environment," IEEE Commun. Surveys Tutorials, vol. 16, no. 3, 2014, pp. 1413-1432. https://doi.org/10.1109/SURV.2013.112813.00168
  23. S. Misra et al., "LAID: A Learning Automata-Based Scheme for Intrusion Detection in Wireless Sensor Networks," Security Commun. Netw., vol. 2, no. 2, 2009, pp. 105-115. https://doi.org/10.1002/sec.74
  24. F. Yu et al., "Automata-Based Symbolic String Analysis for Vulnerability Detection," Formal Methods Syst. Des., vol. 44, no. 1, Feb. 2014, pp. 44-70. https://doi.org/10.1007/s10703-013-0189-1
  25. F. Swiderskia and W. Snyder, "Threat Modeling (Microsoft Professionals)," Microsoft Press, 1st Edition, 2004, pp. 1-240.
  26. G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, Mar. 2000, pp. 535-547. https://doi.org/10.1109/49.840210
  27. The Network Simulator-NS2. Accessed Oct. 1, 2015. http://www.isi.edu/nsnam/ns/
  28. Y. Zhu and J. Kunz, "MAODV Implementation for NS 2.26," Carleton University, Technical Report, SCE-04-01.

Cited by

  1. Prevention of Stealthy Attacks through Privacy Mechanism in Wireless Ad hoc Networks vol.10, pp.16, 2015, https://doi.org/10.17485/ijst/2017/v10i16/112054
  2. Stealthy attack detection in multi-channel multi-radio wireless networks vol.77, pp.14, 2018, https://doi.org/10.1007/s11042-018-5866-z
  3. Defending against Medium Access Control and Network Layer Misbehavior Attacks by Monitoring Nodes in MANET vol.12, pp.3, 2015, https://doi.org/10.3923/ajsr.2019.369.375