Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness

Similar documents
Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

Cooperative Reputation Index Based Selfish Node Detection and Prevention System for Mobile Ad hoc Networks

Security in Ad Hoc Networks Attacks

BISS: Building secure routing out of an Incomplete Set of Security associations

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks

A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks

PARS: Stimulating Cooperation for Power-Aware Routing in Ad-Hoc Networks

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

PerformanceEvaluation of AODV based on black hole attack in ad hoc network

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Security in Ad Hoc Networks *

Route Management Protocol for Misbehavior in Ad Hoc Networks

Cooperation and Accounting Strategy for Multi-hop Cellular Networks

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

An On-demand Secure Routing Protocol Resilient to Byzantine Failures

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities

Security Issues In Mobile Ad hoc Network Routing Protocols

ISSN: [Preet* et al., 6(5): May, 2017] Impact Factor: 4.116

Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks

Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks

Wireless Network Security Spring 2016

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Research Article Comparative Study of Cooperation Tools for Mobile Ad Hoc Networks

A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad Hoc Networks

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes

HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Wireless Network Security Spring 2015

Management Science Letters

LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks

DETECTION OF PACKET FORWARDING MISBEHAVIOR IN WIRELESS NETWORK

Detection of Malicious Nodes in Mobile Adhoc Network

Design & Evaluation of Path-based Reputation System for MANET Routing

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

arxiv:cs/ v2 [cs.ni] 6 Jul 2003

Wireless Network Security Spring 2013

Reliable Broadcast Message Authentication in Wireless Sensor Networks

PARCelS: Pervasive Ad-hoc Relaying for Cellular Systems

Review:- EN-efficient Approaches for MANETs in Rushing Attacks

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

Integration of Co Operation Incentives in Mobile Ad Hoc Network

An Emerging Anomaly Detection Technique to Diminish the Routing Misbehavior in Mobile Ad hoc Network (MANET)

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

International Journal of Advance Research in Computer Science and Management Studies

Routing Security in Wireless Ad Hoc Networks

Detection, penalization and handling of misbehavior in ad hoc wireless networks

Secure routing in ad hoc and sensor networks

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Malicious Node Detection in MANET

Implementation of Enhanced Certificate Revocation of Malicious Nodes in Mobile Adhoc Network

Performance Investigation and Analysis of Secured MANET Routing Protocols

Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks the Static Case

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks

Security Vulnerabilities in Mobile Ad Hoc Networks

Decoy Black-Hole Attack

Subramanian Kumaran Matrikelnummer:

Scheme of security in Mobile Ad Hoc Networks using Route Blacklist Limit Mechanism

A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks

A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET

An Improvement to Mobile Network using Data Mining Approach

CLUSTER-BASED CERTIFICATE REVOCATION IN MOBILE AD-HOC NETWORK USING FUZZY LOGIC Dipti S Sawant 1, Prof. E. Jayanthi 2 1,2

A Survey on Finding Selfish Nodes in Mobile Ad Hoc Networks

Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks

Webpage: Volume 4, Issue VI, June 2016 ISSN

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Network-centric Security Design for Mobile Ad Hoc Networks

Mitigating Malicious Activities by Providing New Acknowledgment Approach

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

Self-Organized Network-Layer Security in Mobile Ad Hoc Networks

Robust And Secured WEP Protocol For Wireless Adhoc Network

A Novel Secure Routing Protocol for MANETs

Reducing the Communication and Processing Overhead and Ensuring the Security in Multihop Wireless Networks - using RACE Mechanism

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited

A Trust-Based Geographical Routing Scheme in Sensor Networks

MODSPIRITE: A Credit Based Solution to Enforce Node Cooperation in an Ad-hoc Network

Cooperation in Mobile Ad Hoc Networks

Ensuring Cooperation with Routing Protocols in Mobile Ad-hoc Networks

Random Dummy Packet Distribution Approach for Detection of Routing Misbehavior in Mobile Ad Hoc Network

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Secure Routing for Mobile Ad-hoc Networks

International Journal of Advanced Research in Computer Science and Software Engineering

Scenario Based Performance Evaluation of Secure Routing in MANETs

Detecting Misbehaving Node In Ad-Hoc Network By Audit Mechanism

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Analytical Impact of Reputation based scheme on DSR protocol for Evaluation of MANETs

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

Wireless Ad-hoc Networks: Employing Behaviour History to Combat Malicious Nodes

hash chains to provide efficient secure solutions for DSDV [7].

Security Enhanced Adaptive Acknowledgment Intrusion Detection System

SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Transcription:

Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness Sonja Buchegger IBM Research, Zurich Research Laboratory CH-8803 Rüschlikon, Switzerland sob@zurich.ibm.com Jean-Yves Le Boudec EPFL-DSC-LCA CH-1015 Lausanne, Switzerland jean-yves.leboudec@epfl.ch Abstract: In mobile ad-hoc networks, nodes do not rely on any routing infrastructure but relay packets for each other. Thus communication in mobile ad-hoc networks functions properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate, for example to save power or to launch security attacks such as denial-of-service. In this paper, we give an overview of potential vulnerabilities and requirements of mobile ad-hoc networks, and of proposed prevention, detection and reaction mechanisms to thwart attacks. 1 Introduction In order to customize security and cooperation solutions for the requirements of various types of mobile ad-hoc networks, we make the following distinctions. Closed vs. open world assumption. Mobile ad-hoc networks can be either managed by an organization that enforces access control or they can be open to any participant that is located closely enough. Prevention vs. detection and reaction mechanisms. According to Schneier [Sch00], a prevention-only strategy will only work if the prevention mechanisms are perfect; otherwise, someone will find out how to get around them. Most of the attacks and vulnerabilities have been the result of bypassing prevention mechanisms. In view of this reality, detection and response are essential. In this paper we present proposals representing all of these classes. Malicious vs. selfish behavior. As there is no infrastructure in mobile ad-hoc networks, the nodes have to cooperate in order to communicate. Intentional non-cooperation is mainly caused by two types of nodes: selfish ones that, e.g., want to save power, and malicious nodes that are not primarily concerned with power saving but that are interested in attacking the network. The remainder of the paper is organized as follows. In Section 2 we state the problem, Proceedings of Mobile Internet Workshop. Informatik 2002., Dortmund, Germany, October 2002

followed by a brief overview of current solution proposals for either prevention or detection/reaction mechanisms in Section 3, and we conclude in Section 4. 2 Security and Cooperation Issues in Mobile Ad-hoc Networks Mobile ad-hoc networks have properties that increase their vulnerability to attacks. Unreliable wireless links are vulnerable to jamming and by their inherent broadcast nature facilitate eavesdropping. Constraints in bandwidth, computing power, and battery power in mobile devices can lead to application-specific trade-offs between security and resource consumption of the device. Mobility/Dynamics make it hard to detect behavior anomalies such as advertising bogus routes, because routes in this environment change frequently. Self-organization is a key property of ad-hoc networks. They cannot rely on central authorities and infrastructures, e.g. for key management. Latency is inherently increased in wireless multi-hop networks, rendering message exchange for security more expensive. Multiple paths are likely to be available. This property offers an advantage over infrastructure-based local area networks that can be exploited by diversity coding. Besides authentication, confidentiality, integrity, availability, access control, and nonrepudiation being harder to enforce because of the properties of mobile ad-hoc networks, there are also additional requirements such as location confidentiality, cooperation fairness and the absence of traffic diversion. The lack of infrastructure and of an organizational environment of mobile ad-hoc networks offers special opportunities to attackers. Without proper security, it is possible to gain various advantages by malicious behavior: better service than cooperating nodes, monetary benefits by exploiting incentive measures or trading confidential information; saving power by selfish behavior; preventing someone else from getting proper service, extracting data to get confidential information, and so on. Routes should be advertised and set up adhering to the routing protocol chosen and should truthfully reflect the knowledge of the topology of the network. By diverting the traffic towards or away from a node, incorrect forwarding, no forwarding at all, or other non-cooperative behavior, nodes can attack the network. Several routing and forwarding attacks have been described, e.g., in [BB01] and [HPJ01]. 3 An Overview of Proposed Solutions 3.1 Prevention Mechanisms Authentication by imprinting. Stajano and Anderson [SA99] authenticate users by imprinting in analogy to ducklings acknowledging the first moving subject they see as their mother, but enable the devices to be imprinted several times. Imprinting is realized by accepting a symmetric encryption key from the first device that sends such a key. They neither address routing nor forwarding, however, user authentication and authorization are

an important prerequisite for trust in the network layer also in mobile ad-hoc networks. Asynchronous threshold security has been employed by Zhou and Haas [ZH99] together with share refreshing for distributed certification authorities for key management in mobile ad-hoc networks. They take advantage of inherent redundancies in such networks due to multiple routes to enable diversity coding, allowing for Byzantine failures given by several corrupted nodes or collusions. This approach potentially is a strong prevention mechanism, however, to the best of our knowledge, the impact on the network and the security performance remain to be investigated. Incentives to cooperate have been proposed by Buttyán and Hubaux [BH00] in the form of so-called nuglets that serve as a per-hop payment in every packet or in the form of counters [BH01] to encourage forwarding. Both nuglets and counters reside in a secure module in each node, are incremented when nodes forward for others and decremented when they send packets for themselves. One of their findings is that, given such a module, increased cooperation is beneficial not only for the entire network but also for individual nodes. Self-organized PGP by using chains of certificates has been developed by Hubaux, Buttyán and Capcun [HBC01]. Several certificate paths can be found by sharing information of nodes that each keep a small part of the certification knowledge, a prerequisite being the assumption that trust is transitive. Localized certification based on the public key infrastructure (PKI) with certificationauthority and secret-share update functionalities distributed among neighbors have been suggested by Kong, Zerfos, Luo, Lu and Zhang [KZL 01]. For threshold secret-sharing and certification nodes need K one-hop neighbors within a given time window. The nodes locally store the system certification revocation list. A simulation showed a good success ratio and tolerable delay. SRP, the Secure Routing Protocol by Papadimitratos and Haas [PH02], guarantees correct route discovery, so that fabricated, compromised, or replayed route replies are rejected or never reach the route requester. SRP assumes a security association between end-points of a path only, so intermediate nodes do not have to be trusted for the route discovery. This is achieved by requiring that the request along with a unique random query indentifier reach the destination, where a route reply is constructed and a message authentication code is computed over the path and returned to the source. The correctness of the protocol is proven analytically. ARIADNE, a secure on-demand routing protocol by Hu, Perrig, and Johnson [HPJ01], prevents attackers from tampering with uncompromised routes consisting of uncompromised nodes. It is based on Dynamic Source Routing (DSR) and relies on symmetric cryptography only. It uses a key management protocol called TESLA that relies on synchronized clocks. Simulations have shown that the performance is close to DSR without optimizations. SEAD, Secure Efficient Distance vector routing for mobile ad-hoc networks by Hu, Johnson and Perrig [HJP02] is based on the design of destination-sequenced distance-vector routing (DSDV) and uses one-way hash functions to prevent uncoordinated attackers from creating incorrect routing state in another node. Performance evaluation has shown that

SEAD outperforms DSDV-SQ in terms of packet delivery ratio, but SEAD adds overhead and latency to the network. 3.2 Detection and Reaction Intrusion detection for wireless ad-hoc networks has been proposed by Zhang and Lee [ZL00] to complement intrusion-prevention techniques. The authors argue that an architecture for intrusion detection should be distributed and cooperative, using statistical anomaly-detection approaches and integrating intrusion-detection information from several networking layers. They use a majority voting mechanism to classify behavior by consensus. Responses include re-authentication or isolation of compromised nodes. Detection rates and performance penalties remain to be investigated. Watchdog and pathrater components to mitigate routing misbehavior have been proposed by Marti, Giuli, Lai and Baker [MGLB00]. They observed increased throughput in mobile ad-hoc networks by complementing DSR with a watchdog for detection of denied packet forwarding and a pathrater for trust management and routing policy rating every path used, which enable nodes to avoid malicious nodes in their routes as a reaction. Although this reaction does not punish malicious nodes that do not cooperate and actually relieves them of the burden of forwarding for others while having their messages forwarded, it allows nodes to use better paths and thus to increase their throughput. CONFIDANT (see our papers [BB01], [BB02a], [BB02b]) stands for Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks and it detects malicious nodes by means of observation or reports about several types of attacks and thus allows nodes to route around misbehaved nodes and to isolate them from the network. Nodes have a monitor for observations, reputation records for first-hand and trusted second-hand observations, trust records to control trust given to received warnings, and a path manager for nodes to adapt their behavior according to reputation. Simulations for no forwarding have shown that CONFIDANT can cope well even with half of the network population acting maliciously. CORE, a collaborative reputation mechanism proposed by Michiardi and Molva [MM02], also has a watchdog component; however it is complemented by a sophisticated reputation mechanism that differentiates between subjective reputation (observations), indirect reputation (positive reports by others), and functional reputation (task-specific behavior), which are weighted for a combined reputation value that is used to make decisions about cooperation or gradual isolation of a node. Reputation values are obtained by regarding nodes as requesters and providers, and comparing the expected result to the actually obtained result of a request. A performance analysis by simulation is stated for future work. 4 Conclusion Mobile ad-hoc networks are vulnerable to attacks that differ from those in fixed networks; their properties pose additional requirements to security and cooperation protocols. There

are many open research challenges, because by definition mobile ad-hoc networks are self-organized and have no infrastructure and central authorities. Examples for research questions are self-organized key management, cooperation incentives, group-membership and access control, authentication and identity persistence, and trust management. References [BB01] [BB02a] [BB02b] [BH00] [BH01] [HBC01] Sonja Buchegger and Jean-Yves Le Boudec. IBM Research Report: The Selfish Node: Increasing Routing Security in Mobile Ad Hoc Networks. RR 3354, 2001. Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403 410, Canary Islands, Spain, January 2002. IEEE Computer Society. Sonja Buchegger and Jean-Yves Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes Fairness In Dynamic Ad-hoc NeTworks. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002. Levente Butty án and Jean-Pierre Hubaux. Enforcing Service Availability in Mobile Ad-Hoc WANs. In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (Mobi- HOC), Boston, MA, USA, August 2000. Levente Butty án and Jean-Pierre Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Technical Report DSC/2001/046, EPFL-DI-ICA, August 2001. J. Hubaux, L. Buttyan, and S. Capkun. The Quest for Security in Mobile Ad Hoc Networks. In Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001. [HJP02] Yih-Chun Hu, David B. Johnson, and Adrian Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless AdHoc Networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), IEEE, Calicoon, NY, to appear., June 2002. [HPJ01] Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for AdHoc Networks. Technical Report Technical Report TR01-383, Department of Computer Science, Rice University, December 2001. [KZL 01] Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In International Conference on Network Protocols (ICNP), pages 251 260, 2001. [MGLB00] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of MOBICOM 2000, pages 255 265, 2000. [MM02] [PH02] [SA99] [Sch00] [ZH99] Pietro Michiardi and Refik Molva. CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks. Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia., 2002. Panagiotis Papadimitratos and Zygmunt J. Haas. Secure Routing for Mobile Ad Hoc Networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002. Frank Stajano and Ross Anderson. The Resurrecting Duckling. Lecture Notes in Computer Science, Springer-Verlag, 1999. Bruce Schneier. Secrets and Lies. Digital Security in a Networked World. John Wiley & Sons, Inc, 1 edition, 2000. Lidong Zhou and Zygmunt Haas. Securing Ad Hoc Networks. In IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/Dezember, pages 24 30, 1999.

[ZL00] Yongguang Zhang and Wenke Lee. Intrusion Detection in Wireless Ad-Hoc Networks. In Proceedings of MOBICOM 2000, pages 275 283, 2000.