Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas
International Journal of Emerging Trends in Science and Technology,
Vol. 1 No. 08 (2014),
2 October 2014
Abstract
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Although the attack models are classified as both external and internal with the latter being more serious because the “always-on†strategy employed in external model has several disadvantages. In an internal threat model an adversary is assumed to be aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of “high importance†are targeted. Although RREQ, RREP, RERR, RREP-ACK are primary Message Formats in reactive protocols, the adversary selectively targets RREQ and RREP packets in the network to launch jamming attacks. Prior approaches concentrated on using commitment schemes that are cryptographic primitives to hide the RREQ and RREP packets from the purview of the adversary. These approaches being successful, I propose to use them along with intrusion detection techniques for identifying compromised routers to increase overall network security significantly by marginalizing the working boundaries of an adversary, thus risking exposure. A practical implementation validates our claim.
How to Cite
Download Citation
References
2. E. M. Sozer, M. Stojanovic, and J. G. Proakis, “Underwater acoustic networks,†IEEE Journal of Oceanic Engineering, vol. 25, no. 1, pp. 72–83, Jan. 2000.
3. R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. JohnWiley&Sons, Inc.,2001.
4. J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,†in Proc. USENIX Security Symposium, Washington, DC, Aug. 2003, pp. 15–28.
5. D. J. Thuente and M. Acharya, “Intelligent jamming in wireless networks with applications to 802.11b and other networks,†in Proc. 25th IEEE Communications Society Military Communications Conference (MILCOM’06), Washington, DC, Oct. 2006, pp. 1–7.
6. A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,†IEEE Computer, vol. 35, no. 10, pp. 54–62, Oct. 2002.
7. G. Lin and G. Noubir, “On link layer denial of service in data wireless LANs,†Wireless Communications and Mobile Computing, vol. 5, no. 3, pp. 273–284, May 2005.
8. W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,†IEEE Network, vol. 20, no. 3, pp. 41–47, May/Jun. 2006.
9. D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Addison- Wesley, 2001, ch. 5, pp. 139–172.
10. E. M. Royer and C. E. Perkins, “Ad hoc on-demand distance vector routing,†in Proc. 2nd IEEE Workshop on mobile Computing Systems and Applications (WMCSA’99), New Orleans, LA, USA, Feb. 1999, pp. 90–100.
- Article Viewed: 32 Total Download