Title: Slander-resistant forwarding isolation in ad hoc networks

Authors: Qijun Gu, Chao-Hsien Chu, Peng Liu, Sencun Zhu

Addresses: Department of Computer Science, Texas State University, San Marcos, TX 78666, USA. ' School of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802, USA. ' School of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802, USA. ' Department of Computer Science, Pennsylvania State University, University Park, PA 16802, USA

Abstract: This paper focuses on how to isolate attackers that inject packets to cause Denial-of-Service (DoS) in ad hoc networks. Our security analysis shows that current hop-by-hop source authentication protocols only partially achieve the defence goals, although they allow legitimate nodes to effectively identify and discard injected or modified packets. The other important defence goal, which has not been achieved yet, is to isolate the attackers so that they cannot inject in the future. Current authentication protocols provide evidence of injection attacks, since injected packets will incur verification failures. Nevertheless, the evidence may be exploited by attackers to deceive defenders. We find that a non-injection attacker can slander any good forwarding node in a route by modifying the authentication information carried in the packets. In order to correctly isolate suspicious nodes, we propose a new authentication approach. The approach not only preserve the function to filter junk packets as in current authentication approaches, but also help to isolate the attackers with a high probability. This approach ensures that defenders can focus on investigating only two nodes to find out the real attacker once failed verifications are detected.

Keywords: denial of service; DoS attacks; source authentication; Chinese remainder theorem; CRT; slander-resistant forwarding isolation; ad hoc networks; wireless networks; authentication protocols; packet filters; attacker isolation; security; packet injection attacks; mobile networks.

DOI: 10.1504/IJMNDI.2006.012086

International Journal of Mobile Network Design and Innovation, 2006 Vol.1 No.3/4, pp.162 - 174

Published online: 20 Jan 2007 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article