Book contents
- Frontmatter
- Contents
- Preface
- Part I Cognitive radio communications and cooperation
- Part II Resource awareness and learning
- Part III Securing mechanism and strategies
- 15 Trust modeling and evaluation
- 16 Defense against routing disruptions
- 17 Defense against traffic-injection attacks
- 18 Stimulation of attack-resistant cooperation
- 19 Optimal strategies for stimulation of cooperation
- 20 Belief evaluation for cooperation enforcement
- 21 Defense against insider attacks
- 22 Secure cooperation stimulation under noise and imperfect monitoring
- References
- Index
16 - Defense against routing disruptions
from Part III - Securing mechanism and strategies
Published online by Cambridge University Press: 06 December 2010
- Frontmatter
- Contents
- Preface
- Part I Cognitive radio communications and cooperation
- Part II Resource awareness and learning
- Part III Securing mechanism and strategies
- 15 Trust modeling and evaluation
- 16 Defense against routing disruptions
- 17 Defense against traffic-injection attacks
- 18 Stimulation of attack-resistant cooperation
- 19 Optimal strategies for stimulation of cooperation
- 20 Belief evaluation for cooperation enforcement
- 21 Defense against insider attacks
- 22 Secure cooperation stimulation under noise and imperfect monitoring
- References
- Index
Summary
In this chapter, we introduce a set of mechanisms to protect mobile ad hoc networks against routing-disruption attacks launched by inside attackers. First, each node launches a route-traffic observer to monitor the behavior of each valid route in its route cache, and to collect the packet-forwarding statistics submitted by the nodes on this route. Since malicious nodes may submit false reports, each node also keeps cheating records for other nodes. If a node is detected as dishonest, this node will be excluded from future routes, and the other nodes will stop forwarding packets for it. Third, each node will try to build friendship with other nodes to speed up malicious-node detection. Route diversity will be explored by each node in order to discover multiple routes to the destination, which can increase the chance of defeating malicious nodes that aim to prevent good routes from being discovered. In addition, adaptive route rediscovery will be applied to determine when new routes should be discovered. It can handle various attacks and introduces little overhead into the existing protocols. Both analysis and simulation studies have confirmed the effectiveness of the defense mechanisms.
Introduction and background
A mobile ad hoc network is a group of mobile nodes not requiring centralized administration or a fixed network infrastructure, in which nodes can communicate with other nodes beyond their direct transmission ranges through cooperatively forwarding packets for each other. One underlying assumption is that they communicate through wireless connections.
- Type
- Chapter
- Information
- Cognitive Radio Networking and SecurityA Game-Theoretic View, pp. 399 - 419Publisher: Cambridge University PressPrint publication year: 2010