Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

被引:94
|
作者
Chang, Jian-Ming [1 ]
Tsou, Po-Chun [2 ]
Woungang, Isaac [3 ]
Chao, Han-Chieh [4 ]
Lai, Chin-Feng [5 ]
机构
[1] Minist Natl Def, Chung Shan Inst Sci & Technol, Taoyuan 325, Taiwan
[2] Natl Def Univ, Chung Cheng Inst Technol, Taoyuan 335, Taiwan
[3] Ryerson Univ, Dept Comp Sci, Toronto, ON M5B 2K3, Canada
[4] Natl Ilan Univ, Inst Comp Sci & Informat Engn, Ilan 260, Taiwan
[5] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2015年 / 9卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
Cooperative bait detection scheme (CBDS); collaborative bait detection; collaborative blackhole attacks; detection mechanism; dynamic source routing (DSR); grayhole attacks; malicious node; mobile ad hoc network (MANET);
D O I
10.1109/JSYST.2013.2296197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this context, preventing or detecting malicious nodes launching grayhole or collaborative blackhole attacks is a challenge. This paper attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactive defense architectures. Our CBDS method implements a reverse tracing technique to help in achieving the stated goal. Simulation results are provided, showing that in the presence of malicious-node attacks, the CBDS outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen as benchmarks) in terms of packet delivery ratio and routing overhead (chosen as performance metrics).
引用
收藏
页码:65 / 75
页数:11
相关论文
共 50 条
  • [21] A New Acknowledgment-based Scheme Against Malicious Nodes and Collusion Attack in MANETs
    Heydari, Vahid
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 784 - 788
  • [22] Defending against mash crowds and malicious traffic attacks with an auction-based method
    Tian, ZH
    Fang, BX
    Yun, XC
    [J]. IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2004), PROCEEDINGS, 2004, : 24 - 28
  • [23] AUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems
    Shen, Shiqi
    Tople, Shruti
    Saxena, Prateek
    [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 508 - 519
  • [24] A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs
    Jhaveri, Rutvij H.
    Desai, Aneri
    Patel, Ankit
    Zhong, Yubin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [25] GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs
    Dhurandher, Sanjay K.
    Woungang, Isaac
    Mathur, Raveena
    Khurana, Prashant
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 357 - 362
  • [26] Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks
    Tomasin, Stefano
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) : 404 - 406
  • [27] Detection of Malicious Nodes Using Collaborative Neighbour Monitoring in DSA Networks
    Takyi, Augustine
    Zlobinsky, Natasha
    Akuye-Shika, Odametey
    Johnson, David
    Densmore, Melissa
    [J]. COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 215 - 230
  • [28] Detection and Localization of Malicious Nodes in Distributed Cooperative Spectrum Sensing Network
    Wu, Xiao-Xiao
    Li, Gang-Qiang
    Zhang, Sheng-Li
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (06): : 1370 - 1380
  • [29] Defending ML-Based Feedback Loop System Against Malicious Adversarial Inference Attacks
    Vahakainu, Petri
    Lehto, Martti
    Kariluoto, Antti
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 382 - 390
  • [30] FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients
    Zhang, Zaixi
    Cao, Xiaoyu
    Jia, Jinyuan
    Gong, Neil Zhenqiang
    [J]. PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, : 2545 - 2555