13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks 161detected as forward<strong>in</strong>g level misbehavior. Therefore, it will decrease when the nodemotion becomes slower.Packet Delivery Rate. The graph of packet delivery rate (Figure 1.c) has two curvesand they represent the throughput of standard DSR and the DSR with the extensionof the prob<strong>in</strong>g technique. The graph demonstrates that the DSR with the prob<strong>in</strong>g techniqueextension always performs better than the standard DSR. This is <strong>in</strong> l<strong>in</strong>e with ourexpectation s<strong>in</strong>ce the bad nodes which failed <strong>in</strong> forward<strong>in</strong>g packets are removed fromthe rout<strong>in</strong>g cache. The result is that good paths are used for transmitt<strong>in</strong>g packets.We can also see from the graphs that packet delivery rate sometimes is higher whenthere is a higher percentage of BAD nodes than when there is a lower percentage ofBAD nodes. This is contrary to the common expectation. As expla<strong>in</strong>ed <strong>in</strong> [19], therandomness of NS-2 results <strong>in</strong> this effect due to the fact that route replies may arriveat nodes <strong>in</strong> different orders <strong>in</strong> different runs. Therefore, a node may choose a path withBAD nodes <strong>in</strong> one run but choose a good path <strong>in</strong> another run.Overhead. As shown <strong>in</strong> Figure 1.d, the rout<strong>in</strong>g overhead is <strong>in</strong>creased significantlywhen the network topology changes faster or there is a high percentage of BAD nodes<strong>in</strong> the network. In both scenarios, a large number of probe messages have to be sentout to f<strong>in</strong>alize the node states. The overhead can be reduced dramatically if prob<strong>in</strong>gmessages piggyback normal data packets.6 ConclusionWireless ad hoc networks are vulnerable to various types of DoS attacks. We presenteda distributed prob<strong>in</strong>g technique to detect and migitate the malicious packet dropp<strong>in</strong>gattack <strong>in</strong> MANETs. We implemented the prob<strong>in</strong>g technique <strong>in</strong> NS-2 with wireless extensions.Our experiments show that <strong>in</strong> a moderately chang<strong>in</strong>g network, the prob<strong>in</strong>gtechnique can detect most of the malicious nodes with a relative low false positive rate.The packet delivery rate can also be <strong>in</strong>creased if the node state <strong>in</strong>formation is sharedwith rout<strong>in</strong>g cache. We th<strong>in</strong>k the prob<strong>in</strong>g technique is of practical significance s<strong>in</strong>ce itcan be implemented <strong>in</strong>dependently from rout<strong>in</strong>g software and does not require modificationto the exist<strong>in</strong>g <strong>in</strong>frastructure. The disadvantage of the prob<strong>in</strong>g technique is that itgenerates relatively high network rout<strong>in</strong>g overhead if probe messages do not piggybackdata packets.References1. ANSI/IEEE std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) specification, 1999.2. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An On-Demand Secure Rout<strong>in</strong>gProtocol Resilient to Byzant<strong>in</strong>e Failures. In ACM Workshop on Wireless Security (WiSe),September 2002.3. S.M. Bellov<strong>in</strong>, M. Leech, and T. Taylor. ICMP Traceback Messages. Internet draft: draftietf-itrace-03.txt,January 2003.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!