Selective Forwarding Attack and Its Detection Algorithms: A Review
Authors: Sushil Sarwa, Rajeev Kumar
Abstract:
The wireless mesh networks (WMNs) are emerging technology in wireless networking as they can serve large scale high speed internet access. Due to its wireless multi-hop feature, wireless mesh network is prone to suffer from many attacks, such as denial of service attack (DoS). We consider a special case of DoS attack which is selective forwarding attack (a.k.a. gray hole attack). In such attack, a misbehaving mesh router selectively drops the packets it receives rom its predecessor mesh router. It is very hard to detect that packet loss is due to medium access collision, bad channel quality or because of selective forwarding attack. In this paper, we present a review of detection algorithms of selective forwarding attack and discuss their advantage & disadvantage. Finally we conclude this paper with open research issues and challenges.
Keywords: CAD algorithm, CHEMAS, selective forwarding attack, watchdog & pathrater, wireless mesh network.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1087039
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2796References:
[1] I. F. Akyildiz and X. Wang, “A survey on wireless mesh networks,”
IEEE Commun. Mag., vol. 43, no. 9, pp. S23-S30, Sept. 2005.
[2] D. M. Shila, Yu Cheng, and T. Anjali. Mitigating selective forwarding
attacks with a channel-aware approach in WMNS. Wireless
Communications, IEEE Transactions on , 9(5):1661 –1675, may 2010.
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing
misbehavior in mobile ad hoc networks,” in Proc. International
Conference on Mobile Computing and Networking, Boston, MA, 2000.
[4] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks:
attacks and countermeasures,” Elsevier’s AdHoc Networks J., vol.1, no.
2-3, pp. 293-315, Sept. 2003.
[5] B. Xiao, B. Yu, and C. Gao, “CHEMAS: identify suspect nodes in
selective forwarding attacks,” J. Parallel and Distrib. Computing,vol. 67,
no. 11, pp. 1218-1230, Nov. 2007.
[6] D. Manikantan Shila and T. Anjali, “Defending selective forwarding
attacks in mesh networks,” in Proc. 2008 Electro/Information
Technology Conference , Ames, IA, May 2008.
[7] R. Curtmola and C. Nita-Rotaru, “BSMR: Byzantine-resilient secure
multicast routing in multi-hop wireless networks,” in Proc. Sensor, Mesh
and Ad Hoc Communications and Networks, June 2007.
[8] A. Perrig, R. Canetti, D. Tygar, and D Song, “The TESLA Broadcast
Authentication Protocol,” in RSA Crypto Bytes, Summer 2002.
[9] A. D. Johnson, D. A. Maltz, and 3. Broch. “The Dynamic Source
Routing Protocol for Mobile Ad-Hoc Networks” (Internet-Draft).
Mobile Ad-hoc Network (MANET) Working Group, IETF, October
1999.D. Johnson. Personal Comm- unication. February 2000.