Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks

Abstract

Standard on-demand routing protocols in wireless ad hoc networks were not originally designed to deal with security threats. Because of that, malicious users have been finding ways to attack networks. Rushing attacks represent one of such possibilities. In these attacks, malicious nodes forward the Route Request (RREQ) packets, asking for a route, to the destination node quicker than the legitimate nodes do. This is possible because the legitimate nodes only forward the first received RREQ packet for a given route discovery. Besides, the attackers can tamper with either the Medium Access Control or routing protocols to get faster processing. As a result, the path through the malicious nodes is chosen, which renders throughput degradation. We propose here a novel, robust routing scheme to defend ad hoc networks against rushing attacks. Our scheme utilizes the “neighbor map mechanism” to establish robust paths as far as rushing attacks are concerned. The proposed scheme also improves path recovery delay by using, whenever it is possible, route maintenance rather than route discovery. Yet, it is energy efficient. The simulation results show that our proposal is indeed viable.

This is a preview of subscription content, log in to check access.

References

  1. 1.

    Xia, L., & Slay, J. (2008). Securing wireless ad hoc networks: Towards a mobile agent security architecture.

  2. 2.

    Deng H., Li W., Agrawal D. P. (2002) Routing security in wireless ad hoc networks. IEEE Communications Magazine 40(10): 70–75

  3. 3.

    Agarwal, K., & Awasthi, L. K. (2008). Enhanced AODV routing protocol for ad hoc networks. In 16th IEEE international conference on networks (pp. 1–5).

  4. 4.

    Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Rushing attacks and defense in wireless ad hoc network routing protocol. In 2nd ACM workshop on wireless security (pp. 30–40).

  5. 5.

    Rawat, A., Vyavahare, P. D., & Ramani, A. K. (2005). Evaluation of rushing attack on secured message transmission (SMT/SRP) protocol for mobile ad hoc networks. In 2005 IEEE international conference on personal wireless communications (pp. 62–66).

  6. 6.

    Kent S., Lynn C., Seo K. (2000) Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications 18(4): 582–592

  7. 7.

    Papadimitratos P., Haas Z. J. (2003) Secure message transmission in mobile ad hoc networks. Ad Hoc Networks 1: 193–209

  8. 8.

    Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In SCS communication networks and distributed systems modeling and simulation conference (pp. 193–204).

  9. 9.

    Dreef, D., Ahari, S., Wu, K., & King, V. (2004). Utilizing the uncertainty of intrusion detection to strengthen security for ad hoc networks. In 3rd International Conference on AD-HOC Networks and Wireless LNCS (Vol. 3158, pp. 82–95)

  10. 10.

    Thriveni, J., Akekhya, V. L., Deepa, N., Uma, B., Alice, A., Prakash, G. L., et al. (2008). QoS preemptive routing with bandwidth estimation for improved performance in ad hoc networks. In 4th international conference on information and automation for sustainability (pp. 443–448).

  11. 11.

    Nakamura S., Ohta K., Kato N. (2001) Proposal of dynamic bandwidth allocation technique for low delay/low jitter realtime communication and its evaluation by using CBQ. IEICE Transactions on Communications E84-B(6): 1513–1520

  12. 12.

    The VINT project: The network simulator—ns-2. Available at http://www.isi.edu/nsnam/ns/.

  13. 13.

    Johnson, D. B. (1994). Routing in ad hoc networks of mobile hosts. In IEEE computer society workshop on mobile computing systems and applications (pp. 158–163).

  14. 14.

    Kim H., Han S., Song J. (2006) A routing protocol for throughput enhancement and energy saving in mobile ad hoc networks. International Conference on Computational Science and Applications. LNCS 3981(2): 359–368

  15. 15.

    Cheng, M. X., Cardei, M., Sun, J., Cheng, X., Wang, L., Xu, Y., et al. (2004). Topology control of ad hoe wrieless networks for energy efficiency. IEEE Transactions on Computers. 53(12), 1629–1635.

Download references

Author information

Correspondence to Hyojin Kim.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Kim, H., de Oliveira, R., Bhargava, B. et al. A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks. Wireless Pers Commun 70, 1339–1351 (2013). https://doi.org/10.1007/s11277-012-0751-y

Download citation

Keywords

  • Mobile node
  • On-demand routing protocol
  • Rushing attack
  • Wireless ad hoc network