The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Mitigation of Control and Data Traffic Attacks in Wireless

Download

Download PDF Document
PDF

Author

Issa Khalil

Tech report number

CERIAS TR 2007-36

Entry type

phdthesis

Abstract

Recently we have seen increasing adoption of wireless ad-hoc and sensor networks (WAHAS) for security critical applications in military and civilian domains, such as battlefield surveillance and emergency rescue and relief. However, they are often exposed to a wide-range of control and data traffic attacks. Control attacks are directed to control traffic in the network, such as routing and localization. Examples are wormhole, Sybil, and rushing attacks. Control attacks are often easy to launch even without the need for any cryptographic key and can be used to subvert the functionality of the network by disrupting data flow. Data traffic attacks include selective forwarding and misrouting attacks. We have pursued two lines of defense to secure WAHAS networks. The first is attack prevention using low-cost key management for encryption and authentication. Our protocol SECOS provides the guarantee that communication between any two nodes remains secure despite compromise of any number of other nodes. The second line of defense is control and data traffic attack detection, diagnosis, and isolation through local monitoring and response. Each node oversees the traffic in its one-hop neighborhood and maintains state for the behavior of each neighbor. We develop a suite of three protocols for respectively static networks, mobile networks, and energy efficient sleep-awake aware local monitoring. To demonstrate the protocols, we perform analysis and simulations in ns-2. The metrics for evaluation include fraction of data received at the destination, coverage and delay of isolation, likelihood of false positives, and overhead in terms of resource consumption.

Download

PDF

Date

2007 – 05

Key alpha

MITIGATION OF CONTROL, DATA TRAFFIC ATTACKS, Wireless, AD-HOC, Sensor, Networks

Pages

229

School

Purdue University

Publication Date

2007-05-01

Contents

1. Introduction 2. Local Monitoring: Detection and Isolation Primitives 3. Mitigation of the Wormhole Attack in Static WAHAS Networks: LITEWORP 4. Mitigating Other Control and Data Traffic Attacks in Static WAHAS Networks: Dicas 5. Sleep-Wake Aware Local Monitoring: SLAM 6. Mitigation of the wormhole attack on mobile WAHAS Networks: MOBIWORP 7. Key Management: Secos 8. Related Work 9. Conclusion 10. Future Work

Language

English

Subject

MITIGATION OF CONTROL AND DATA TRAFFIC ATTACKS IN WIRELESS AD-HOC AND SENSOR NETWORKS

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.