The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - May (2011 vol.10)
pp: 653-668
Jing Dong , Purdue Unversity, West Lafayette
Reza Curtmola , New Jersey Institute of Technology, Newark
Cristina Nita-Rotaru , Purdue University, West Lafayette
ABSTRACT
Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. In this work, we identify novel attacks against high-throughput multicast protocols in wireless mesh networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. We show that these attacks are very effective against multicast protocols based on high-throughput metrics. We conclude that aggressive path selection is a double-edged sword: While it maximizes throughput, it also increases attack effectiveness in the absence of defense mechanisms. Our approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The solution accommodates transient network variations and is resilient against attempts to exploit the defense mechanism itself. A detailed security analysis of our defense scheme establishes bounds on the impact of attacks. We demonstrate both the attacks and our defense using ODMRP, a representative multicast protocol for wireless mesh networks, and SPP, an adaptation of the well-known ETX unicast metric to the multicast setting.
INDEX TERMS
Wireless mesh networks, high-throughput metrics, secure multicast routing, metric manipulation attacks, Byzantine attacks.
CITATION
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, "Secure High-Throughput Multicast Routing in Wireless Mesh Networks", IEEE Transactions on Mobile Computing, vol.10, no. 5, pp. 653-668, May 2011, doi:10.1109/TMC.2010.194
REFERENCES
[1] J. Dong, R. Curtmola, and C. Nita-Rotaru, "On the Pitfalls of Using High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks," Proc. Fifth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '08), 2008.
[2] Y.B. Ko and N.H. Vaidya, "Flooding-Based Geocasting Protocols for Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 471-480, 2002.
[3] R. Chandra, V. Ramasubramanian, and K. Birman, "Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks," Proc. 21st IEEE Int'l Conf. Distributed Computing Systems (ICDCS '01), 2001.
[4] Y.-B. Ko and N.H. Vaidya, "GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks," Proc. Int'l Conf. Network Protocols (ICNP), pp. 240-250, 2000.
[5] E.L. Madruga and J.J. Garcia-Luna-Aceves, "Scalable Multicasting: the Core-Assisted Mesh Protocol," Mobile Networks and Applications, vol. 6, no. 2, pp. 151-165, 2001.
[6] S.J. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 441-453, 2002.
[7] E.M. Royer and C.E. Perkins, "Multicast Ad-Hoc On-Demand Distance Vector (MAODV) Routing," Internet Draft, July 2000.
[8] J.G. Jetcheva and D.B. Johnson, "Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks," Proc. ACM MobiHoc, 2001.
[9] H. Lundgren, E. Nordstrom, and C. Tschudin, "Coping with Communication Gray Zones in IEEE 802.11b Based Ad Hoc Networks," Proc. Fifth ACM Int'l Workshop Wireless Mobile Multimedia (WOWMOM '02), 2002.
[10] D.S.J.D. Couto, D. Aguayo, J.C. Bicket, and R. Morris, "A High-Throughput Path Metric for Multi-Hop Wireless Routing," Proc. ACM MobiCom, 2003.
[11] S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-Throughput Multicast Routing Metrics in Wireless Mesh Networks," Proc. 26th IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2006.
[12] A. Chen, D. Lee, G. Chandrasekaran, and P. Sinha, "HIMAC: High Throughput MAC Layer Multicasting in Wireless Networks," Proc. IEEE Int'l Conf. Mobile Adhoc and Sensor Systems (MASS '06), 2006.
[13] B. Awerbuch, D. Holmer, and H. Rubens, "The Medium Time Metric: High Throughput Route Selection in Multirate Ad Hoc Wireless Networks," Mobile Networks and Applications, Special Issue on Internet Wireless Access: 802.11 and Beyond, vol. 11, no. 2, pp. 253-266, 2005.
[14] A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou, "A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks," Proc. First Int'l Conf. Broadband Networks (BroadNets '04), 2004.
[15] S. Keshav, "A Control-Theoretic Approach to Flow Control," Proc. ACM SIGCOMM, 1993.
[16] R. Draves, J. Padhye, and B. Zill, "Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks," Proc. ACM MobiCom, 2004.
[17] P. Papadimitratos and Z. Haas, "Secure Routing for Mobile Ad Hoc Networks," Proc. SCS Comm. Networks and Distributed Systems Modeling and Simulation Conf. (CNDS), pp. 27-31, Jan. 2002.
[18] Y.-C. Hu, D.B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications (WMCSA), 2002.
[19] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP), 2002.
[20] S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, Aug. 2000.
[21] P. Papadimitratos and Z. Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," Proc. Second ACM Workshop Wireless Security (WiSe), pp. 41-50, 2003.
[22] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure on-Demand Routing Protocol for Ad Hoc Networks," Proc. ACM MobiCom, 2002.
[23] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks," ACM Trans. Information Systems Security, vol. 10, no. 4, pp. 1-35, 2007.
[24] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "On the Survivability of Routing Protocols in Ad Hoc Wireless Networks," Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), 2005.
[25] S. Roy, V.G. Addada, S. Setia, and S. Jajodia, "Securing MAODV: Attacks and Countermeasures," Proc. Second Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '05), 2005.
[26] R. Curtmola and C. Nita-Rotaru, "BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-Hop Wireless Networks," IEEE Trans. Mobile Computing, vol. 8, no. 4, pp. 445-459, Apr. 2009.
[27] R. Draves, J. Padhye, and B. Zill, "Comparison of Routing Metrics for Static Multi-Hop Wireless Networks," Proc. ACM SIGCOMM, 2004.
[28] S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-Throughput Multicast Routing Metrics in Wireless Mesh Networks," Ad Hoc Networks, vol. 6, no. 6, pp. 878-899, 2007.
[29] S. Zhong, L.E. Li, Y.G. Liu, and Y.R. Yang, "On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks: An Integrated Approach Using Game Theoretic and Cryptographic Techniques," Wireless Networks, vol. 13, no. 6, pp. 799-816, 2007.
[30] L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2003.
[31] R. Pickholtz, D. Schilling, and L. Milstein, "Theory of Spread-Spectrum Communications—A Tutorial," IEEE Trans. Comm., vol. 30, no. 5, pp. 855-884, May 1982.
[32] N. Abramson, "The Aloha System—Another Alternative for Computer Communications," Proc. AFIPS Fall Joint Computer Conf., 1970.
[33] J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04), 2004.
[34] C. Piro, C. Shields, and B.N. Levine, "Detecting the Sybil Attack in Mobile Ad Hoc Networks," Proc. Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm), 2006.
[35] Y. Yang and R. Kravets, "Contention-Aware Admission Control for Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, July/Aug. 2005.
[36] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proc. Second ACM Workshop Wireless Security (WiSe), 2003.
[37] Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks," Proc. IEEE INFOCOM, 2003.
[38] J. Eriksson, S.V. Krishnamurthy, and M. Faloutsos, "Truelink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks," Proc. 14th IEEE Int'l Conf. Network Protocols (ICNP '06), 2006.
[39] L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," Proc. Network and Distributed System Security Symp. (NDSS), 2004.
[40] A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and Secure Source Authentication for Multicast," Proc. Network and Distributed System Security Symp. (NDSS), Feb. 2001.
[41] M. Poturalski, P. Papadimitratos, and J.-P. Hubaux, "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility," Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '08), 2008.
[42] D.S. Moore and G.P. McCabe, Introduction to the Practice of Statistics. W.H. Freeman, 2003.
[43] "Global Mobile Information Systems Simulation Library— GloMoSim," http://pcl.cs.ucla.edu/projectsglomosim, 2010.
[44] M. Guerrero Zapata and N. Asokan, "Securing Ad Hoc Routing Protocols," Proc. First ACM Workshop Wireless Security (WiSe '02), 2002.
[45] P. Papadimitratos and Z.J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks," Proc. IEEE Symp. Applications and the Internet (SAINT '03) Workshops, 2003.
[46] P.P. Papadimitratos and Z.J. Haas, "Secure Route Discovery for QoS-Aware Routing in Ad Hoc Networks," Proc. IEEE/Sarnoff Symp. Advances in Wired and Wireless Comm., 2006.
[47] T. Zhu and M. Yu, "A Dynamic Secure QoS Routing Protocol for Wireless Ad Hoc Networks," Proc. IEEE Sarnoff Symp., 2006.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool