Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

被引:94
|
作者
Chang, Jian-Ming [1 ]
Tsou, Po-Chun [2 ]
Woungang, Isaac [3 ]
Chao, Han-Chieh [4 ]
Lai, Chin-Feng [5 ]
机构
[1] Minist Natl Def, Chung Shan Inst Sci & Technol, Taoyuan 325, Taiwan
[2] Natl Def Univ, Chung Cheng Inst Technol, Taoyuan 335, Taiwan
[3] Ryerson Univ, Dept Comp Sci, Toronto, ON M5B 2K3, Canada
[4] Natl Ilan Univ, Inst Comp Sci & Informat Engn, Ilan 260, Taiwan
[5] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2015年 / 9卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
Cooperative bait detection scheme (CBDS); collaborative bait detection; collaborative blackhole attacks; detection mechanism; dynamic source routing (DSR); grayhole attacks; malicious node; mobile ad hoc network (MANET);
D O I
10.1109/JSYST.2013.2296197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malevolent nodes, this requirement may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this context, preventing or detecting malicious nodes launching grayhole or collaborative blackhole attacks is a challenge. This paper attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme (CBDS), that integrates the advantages of both proactive and reactive defense architectures. Our CBDS method implements a reverse tracing technique to help in achieving the stated goal. Simulation results are provided, showing that in the presence of malicious-node attacks, the CBDS outperforms the DSR, 2ACK, and best-effort fault-tolerant routing (BFTR) protocols (chosen as benchmarks) in terms of packet delivery ratio and routing overhead (chosen as performance metrics).
引用
收藏
页码:65 / 75
页数:11
相关论文
共 50 条
  • [41] Launching Adversarial Label Contamination Attacks Against Malicious URL Detection
    Marchand, Bruno
    Pitropakis, Nikolaos
    Buchanan, William J.
    Lambrinoudakis, Costas
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021), 2021, 12927 : 69 - 82
  • [42] A segment-based approach of defending against buffer overflow attacks
    Tan, YA
    Zheng, JY
    Cao, YD
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 430 - 432
  • [43] Defending malware detection models against evasion based adversarial attacks
    Rathore, Hemant
    Sasan, Animesh
    Sahay, Sanjay K.
    Sewak, Mohit
    [J]. PATTERN RECOGNITION LETTERS, 2022, 164 : 119 - 125
  • [44] MCR Decoding: A MIMO Approach for Defending Against Wireless Jamming Attacks
    Shen, Wenbo
    Ning, Peng
    He, Xiaofan
    Dai, Huaiyu
    Liu, Yao
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 133 - 138
  • [45] A Reinforcement Learning Approach for Defending Against Multiscenario Load Redistribution Attacks
    Lei, Jieyu
    Gao, Shibin
    Shi, Jian
    Wei, Xiaoguang
    Dong, Ming
    Wang, Wenshuang
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (05) : 3711 - 3722
  • [46] An SDN-based Approach For Defending Against Reflective DDoS Attacks
    Lukaseder, Thomas
    StOlzle, Kevin
    Kleber, Stephan
    Erb, Benjamin
    Kargl, Frank
    [J]. PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 299 - 302
  • [47] A Cooperative approach for Malicious Node Detection in impromptu Wireless Networks
    Gupta, Devendra
    Dhawale, Chitra
    Misra, Sanjay
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [48] Defending Against Stealthy Attacks on Multiple Nodes With Limited Resources: A Game-Theoretic Analysis
    Zhang, Ming
    Zheng, Zizhan
    Shroff, Ness B.
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04): : 1665 - 1677
  • [49] Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET<bold> </bold>
    Umar, Mubarak
    Sabo, Abdulrashid
    Tata, Auwal. A.
    [J]. 2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 121 - 126
  • [50] CRCMD&R: Cluster and Reputation based Cooperative Malicious Node Detection & Removal Scheme in MANETs
    Sharma, Saurabh
    Gambhir, Sapna
    [J]. PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 336 - 340