Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges

被引:66
|
作者
Djahel, Soufiene [1 ]
Nait-Abdesselam, Farid [1 ]
Zhang, Zonghua
机构
[1] Univ Sci & Technol Lille, Dept Comp Sci, Lille, France
来源
关键词
Ad Hoc Networks; Routing Protocols Security; Packet Dropping Attack; Black Hole Attack; SECURITY; AUTHENTICATION;
D O I
10.1109/SURV.2011.072210.00026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other's packets in order to enable out of range communication. However, in hostile environments, some nodes may deny to do so, either for saving their own resources or for intentionally disrupting regular communications. This type of misbehavior is generally referred to as packet dropping attack or black hole attack, which is considered as one of the most destructive attacks that leads to the network collapse. The special network characteristics, such as limited battery power and mobility, make the prevention techniques based on cryptographic primitives ineffective to cope with such attack. Rather, a more proactive alternative is required to ensure the safety of the forwarding function by staving off malicious nodes from being involved in routing paths. Once such scheme fails, some economic-based approaches can be adopted to alleviate the attack consequences by motivating the nodes cooperation. As a backup, detection and reaction schemes remain as the final defense line to identify the misbehaving nodes and punish them. In this paper, we make a comprehensive survey investigation on the state-of-the-art countermeasures to deal with the packet dropping attack. Furthermore, we examine the challenges that remain to be tackled by researchers for constructing an in-depth defense against such a sophisticated attack.
引用
收藏
页码:658 / 672
页数:15
相关论文
共 50 条
  • [1] Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks
    Sonekar, Shrikant V.
    Kshirsagar, Manali M.
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 317 - 328
  • [2] Adding Security against Packet Dropping Attack in Mobile Ad hoc Networks
    Zeshan, Muhammad
    Khan, Shoab A.
    Cheema, Ahmad Raza
    Ahmed, Attique
    [J]. 2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 568 - 572
  • [3] A distributed protocol for detection of packet dropping attack in mobile ad hoc networks
    Sen, Jaydip
    Chandra, M. Girish
    Balamuralidhar, P.
    Harihara, S. G.
    Reddy, Harish
    [J]. ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 75 - 80
  • [4] Detecting packet-dropping faults in mobile ad-hoc networks
    Medidi, SR
    Medidi, M
    Gavini, S
    [J]. CONFERENCE RECORD OF THE THIRTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 2003, : 1708 - 1712
  • [5] A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks
    Rmayti, Mohammad
    Khatoun, Rida
    Begriche, Youcef
    Khoukhi, Lyes
    Gaiti, Dominique
    [J]. COMPUTER NETWORKS, 2017, 121 : 53 - 64
  • [6] Middleware proposals for mobile ad hoc networks
    da Silva, Eduardo
    Albini, Luiz Carlos P.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 43 : 103 - 120
  • [7] Resisting malicious packet dropping in wireless ad hoc networks
    Just, M
    Kranakis, E
    Wan, T
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 151 - 163
  • [8] A Reputation-based Scheme against Malicious Packet Dropping for Mobile Ad Hoc Networks
    Song JianHua
    Ma ChuanXiang
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 113 - 117
  • [9] Anomaly based Intrusion detection of Packet Dropping Attacks in Mobile Ad-hoc Networks
    Uyyala, Shivani
    Naik, Dinesh
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1137 - 1140
  • [10] Mitigating malicious control packet floods in ad hoc networks
    Desilva, S
    Boppana, RV
    [J]. 2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 2112 - 2117