Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Sensor Networks for Emergency Response: Challenges and Opportunities
IEEE Pervasive Computing
Proceedings of the 4th international conference on Mobile systems, applications and services
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
IEEE Transactions on Mobile Computing
SENDROM: sensor networks for disaster relief operations management
Wireless Networks
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A tale of two synchronizing clocks
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
Design and Deployment of Sensor Network for Real-Time High-Fidelity Volcano Monitoring
IEEE Transactions on Parallel and Distributed Systems
Efficient incremental code update for sensor networks
ACM Transactions on Sensor Networks (TOSN)
ELMO: Energy Aware Local Monitoring in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
IEEE Transactions on Mobile Computing
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking
IEEE Communications Magazine
MSN: mutual secure neighbor verification in multi-hop wireless networks
Security and Communication Networks
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Disasters such as flooding, earthquake, famine and terrorist attacks might occur any time anywhere without prior warnings. In most cases it is difficult to predict when a disaster might occur however, well-planned disaster recovery procedures will reduce the intensity of expected consequences. When a disaster occurs, infrastructure based communications are most likely to be crippled, worsening the critical situation on hand. Wireless ad hoc and sensor network (WASN) technologies are proven to be valuable in coordinating and managing rescue operations during disasters. However, the increasing reliance on WASNs make them attractive to malicious attackers, especially terrorist groups, in a bid to hamper rescue operations amplifying the damage and increasing the number of casualties. Therefore, it is necessary to ensure the fidelity of data traffic through WASN against malicious traffic disruption attacks. In this paper, we first demonstrate how WASN can be used in a well-planned disaster recovery effort. Then, we introduce and analyze one of the most severe traffic disruption attacks against WASNs, called Identity Delegation, and its countermeasures. Its severity lies in its capability to evade detection by even state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes for dropping the traffic. We introduce a technique to mitigate identity delegation attack, dubbed Sadec, and compare it with the state-of-the-art mitigation technique namely Basic Local Monitoring (BLM) under a wide range of network scenarios. Our analysis which is validated by extensive ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation attacks while Sadec successfully mitigates them. The results also show that Sadec achieves higher delivery ratios of data packets compared to BLM. On the other hand, the results show similar behavior in framing probabilities between Sadec and BLM. However, the desirable features of Sadec come at the expense of higher false isolation probabilities in networks with heavy traffic load and poor communication links.