Intruder Identification in Ad Hoc Networks. Problem Statement Intruder identification in ad hoc networks is the procedure of identifying the user or host.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
A Survey of Secure Wireless Ad Hoc Routing
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
On Security Study of Two Distance Vector Routing Protocols for Ad Hoc Networks Weichao Wang, Yi Lu, Bharat Bhargava CERIAS and Department of Computer Sciences.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Routing Security in Ad Hoc Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
Routing Two papers: Location-Aided Routing (LAR) in mobile ad hoc networks (2000) Ad-hoc On-Demand Distance Vector Routing (1999)
The Zone Routing Protocol (ZRP)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Institut für Betriebssysteme und Rechnerverbund Technische Universität Braunschweig Multi hop Connectivity in Mobile Ad hoc Networks (MANETs) Habib-ur.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Adhoc Network: Routing Protocol:AODV
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Routing and Routing Protocols
Sonali Bhargava and Dharma P. Agrawal Center for Distributed & Mobile Computing Dept of ECECS, University of Cincinnati Security Enhancements in AODV protocol.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
Routing design goals, challenges,
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ITIS 6010/8010 Wireless Network Security
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

Intruder Identification in Ad Hoc Networks

Problem Statement Intruder identification in ad hoc networks is the procedure of identifying the user or host that conducts the inappropriate, incorrect, or anomalous activities that threaten the connectivity or reliability of the networks and the authenticity of the data traffic in the networks. Papers: “On Security Study of Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks”, in Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom), “On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol”, in Proceedings of 10 th IEEE International Conference on Telecommunication (ICT), 2003.

Research Motivation More than ten routing protocols for Ad Hoc networks have been proposed (AODV, DSR, DSDV, TORA, ZRP, etc.) Research focus has been on performance comparison and optimizations such as multicast and multiple path detection Research is needed on the security of Ad Hoc networks. Applications: Battlefields, Disaster recovery.

Research Motivation Two types of attacks target Ad Hoc network External attacks: MAC layer jamming Traffic analysis Internal attacks: Compromised host sending false routing information Fake authentication and authorization Traffic flooding

Research Motivation Protection of Ad Hoc networks Intrusion Prevention Traffic encryption Sending data through multiple paths Authentication and authorization Intrusion Detection Anomaly pattern examination Protocol analytical study

Research Motivation Deficiencies of intrusion prevention Increases the overhead during normal operations of Ad Hoc networks Restriction on power consumption and computation capability prevent the usage of complex encryption algorithms Flat infrastructure increases the difficulty for the key management and distribution Cannot guard against internal attacks

Research Motivation Why intrusion detection itself is not enough Detecting intrusion without removing the malicious host leaves the protection in a passive mode Identifying the source of the attack may accelerate the detection of other attacks

Research Motivation Research problem: Intruder Identification Research challenges: How to locate the source of an attack ? How to safely combine the information from multiple hosts and enable individual host to make decision by itself ? How to achieve consistency among the conclusions of a group of hosts ?

Related Work in wired Networks Secure routing / intrusion detection in wired networks Routers have more bandwidth and CPU power Steady network topology enables the use of static routing and default routers Large storage and history of operations enable the system to collect enough information to extract traffic patterns Easier to establish trust relation in the hierarchical infrastructure

Related Work in wired networks Attack on RIP (Distance Vector) False distance vector Solution (Bellovin 89) Static routing Listen to specific IP address Default router Cannot apply in Ad Hoc networks

Related Work in wired networks Attack on OSPF (Link State) False connectivity Attack on Sequence Number Attack on lifetime Solution JiNAO:NCSU and MCNC Encryption and digital signature

Related Work in Ad Hoc Networks Lee at GaTech summarizes the difficulties in building IDS in Ad Hoc networks and raises questions: what is a good architecture and response system? what are the appropriated audit data sources? what is the good model to separate normal and anomaly patterns? Haas at Cornell lists the 2 challenges in securing Ad Hoc networks: secure routing key management service

Related Work in Ad Hoc Networks Agrawal at University of Cincinnati presents the general security schemes for the secure routing in Ad Hoc networks Nikander at Helsinki discusses the authentication, authorization, and accounting in Ad Hoc networks Bhargavan at UIUC presents the method to enhance security by dynamic virtual infrastructure Vaidya at UIUC presents the idea of securing Ad Hoc networks with directional antennas

Related Work ongoing projects TIARA: Techniques for Intrusion Resistant Ad-Hoc Routing Algorithm (DARPA) develop general design techniques focus on DoS attack sustain continued network operations Secure Communication for Ad Hoc Networking (NSF) Two main principles: redundancy in networking topology, route discovery and maintenance distribution of trust, quorum for trust

Related Work ongoing projects On Robust and Secure Mobile Ad Hoc and Sensor Network (NSF) local route repair performance analysis malicious traffic profile extraction distributed IDs proposed a scalable routing protocol Adaptive Intrusion Detection System (NSF) enable data mining approach proactive intrusion detection establish algorithms for auditing data

Problem Statement Intruder identification in ad hoc networks is the procedure of identifying the user or host that conducts the inappropriate, incorrect, or anomalous activities that threaten the connectivity or reliability of the networks and the authenticity of the data traffic in the networks.

Evaluation Criteria Accuracy False coverage: Number of normal hosts that are incorrectly marked as suspected. False exclusion: Number of malicious hosts that are not identified as such. Overhead Overhead measures the increases in control packets and computation costs for identifying the attackers (e.g. verifying signed packets, updating blacklists). Workload of identifying the malicious hosts in multiple rounds

Evaluation Criteria Effectiveness –Effectiveness: Increase in the performance of ad hoc networks after the malicious hosts are identified and isolated. Metrics include the increase of the packet delivery ratio, the decrease of average delay, or the decrease of normalized protocol overhead (control packets/delivered packets). Robustness –Robustness of the algorithm: Its ability to resist different kinds of attacks.

Assumptions A1. Every host can be uniquely identified and its ID cannot be changed throughout the lifetime of the ad hoc network. The ID is used in the identification procedure. A2. A malicious host has total control on the time, the target and the mechanism of an attack. The malicious hosts continue attacking the network. A3. Digital signature and verification keys of the hosts have been distributed to every host. The key distribution in ad hoc networks is a tough problem and deserves further research. Several solutions have been proposed. We assume that the distribution procedure is finished, so that all hosts can examine the genuineness of the signed packets. A4. Every host has a local blacklist to record the hosts it suspects. The host has total control on adding and deleting elements from its list. For the clarity of the remainder of this paper, we call the real attacker as “malicious host”, while the hosts in blacklists are called “suspected hosts”.

Applying Reverse Labeling Restriction to Protect AODV Introduction to AODV Attacks on AODV and their impacts Detecting False Destination Sequence Attack Reverse Labeling Restriction Protocol Simulation results

Introduction to AODV Introduced in 97 by Perkins at NOKIA, Royer at UCSB 12 versions of IETF draft in 3 years, 4 academic implementations, 2 simulations Combines on-demand and distance vector Broadcast Route Query, Unicast Route Reply Quick adaptation to dynamic link condition and scalability to large scale network Support Multicast

Security Considerations for AODV “ AODV does not specify any special security measures. Route protocols, however, are prime targets for impersonation attacks. If there is danger of such attacks, AODV control messages must be protected by use of authentication techniques, such as those involving generation of unforgeable and cryptographically strong message digests or digital signatures. ” -

Message Types in AODV RREQ: route request RREP: route reply RERR: route error

Route Discovery in AODV S D S1 S2 S3 S4 Broadcast request Establish path to the source Broadcast request Establish path to the source Broadcast request Establish path to the source Establish path to the destination Unicast reply Establish path to the destination Unicast reply Establish path to the destination Unicast reply

Introduction to AODV (con’d) Security Features of AODV Combination of Broadcast and Unicast Route reply is sent out along a single path, prevent the disclosure of routing information Fast Expiration of Reverse Route Entry Route entry created by un-replied route request will expire in a short time Freshness of Routing Information Unique, monotonic destination sequence for every host, could only be updated by destination/request initiator

Attacks on AODV Malicious route request –query non-existing host (RREQ will flood throughout the network) False route error –route broken message sent back to source (route discovery is re-initiated) False distance vector –reply “one hop to destination” to every request and select a large enough sequence number False destination sequence –select a large number (even beat the reply from real destination)

Impacts of Attacks on AODV Packet Delivery Ratio Protocol Overhead No Attacks96%38% Silent Discard91%41% False Distance75%38% False Destination Sequence 53%66% Vicious Flooding91%293%

False Destination Sequence Attack D SS1 S2 M S3 RREP(D, 5) RREP(D, 20) RREQ(D, 3) RREP(D, 5) RREP(D, 20)

Attacks on AODV and Simulation Results Simulation of Attacks A module called “AODV Attack” added into ns2 Four attacks have been implemented malicious route request silently discard false distance vector false destination sequence

Attacks to AODV and Simulation Results Simulation parameters Simulatorns2 Simulation duration1000 seconds Simulation area1000 * 1000 m Number of mobile hosts30 Transmission range250 m (Lucent WaveLAN Card Specification) Maximum speed m/s Number of CBR connection25 Packet rate2 pkt / sec Simulated attacksFalse distance vector and false destination sequence

Attacks to AODV and Simulation Results X-axis is max moving speed, which evaluates the mobility of host. Y-axis is delivery ratio. Two attacks: false distance vector and false destination sequence, are considered. They lead to about 30% and 50% of packets to be dropped.

Detecting false destination sequence attack by destination host during route rediscovery D SS1 S2 M S3 S4 RREQ(D, 21) (1). S broadcasts a request that carries the old sequence + 1 = 21 (2) D receives the RREQ. Local sequence is 5, but the sequence in RREQ is 21. D detects the false desti- nation sequence attack. Propagation of RREQ

Reverse Labeling Restriction (RLR) Basic Ideas Every host maintains a blacklist to record suspicious hosts. Suspicious hosts can be released from the blacklist or put there permanently. The destination host will broadcast an INVALID packet with its signature when it finds that the system is under attack on sequence. The packet carries the host’s identification, current sequence, new sequence, and its own blacklist. Every host receiving this packet will examine its route entry to the destination host. If the sequence number is larger than the current sequence in INVALID packet, the presence of an attack is noted. The next hop to the destination will be added into this host’s blacklist.

Reverse Labeling Restriction (RLR) All routing information or intruder identification packets from hosts in blacklist will be ignored, unless the information is about themselves. After a host is released from the blacklist, the routing information or identification results from it will be processed.

Example to illustrate RLR D SS1 S2 M S3 S4 BL {} BL {S2} BL {} BL {M} BL {S1} BL {} D sends INVALID packet with current sequence = 5, new sequence = 21. S3 examines its route table, the entry to D is not false. S3 forward packet to S1. S1 finds that its route entry to D has sequence 20, which is > 5. It knows that the route is false. The hop which provides this false route to S1 was S2. S2 will be put into S1’s blacklist. S1 forward packet to S2 and S. S2 adds M into its blacklist. S adds S1 into its blacklist. S forward packet to S4. S4 does not change its blacklist since it is not involved in this route. INVALID ( D, 5, 21, {}, SIGN )

Reverse Labeling Restriction (con’d) Update Blacklist by INVALID Packet Next hop on the invalid route will be put into local blacklist, a timer starts, a counter ++ Labeling process will be done in the reverse direction of route When timer expires, the suspicious host will be released from the blacklist and routing information from it will be accepted If counter > threshold, the suspicious host will be permanently put into blacklist

RLR creates suspicion trees. If a host is the root of a quorum of suspicion trees, it is labeled as the attacker.

Reverse Labeling Restriction (con’d) Update local blacklist by other hosts’ blacklist Attach local blacklist to INVALID packet with digital signature to prevent impersonation Every host will count the hosts involved in different routes that say a specific host is suspicious. If the number > threshold, it will be permanently added into local blacklist and identified as an attacker. Threshold can be dynamically changed or can be different on various hosts

Reverse Labeling Restriction (con’d) Two other effects of INVALID packets Establish routes to the destination host: when the host sends out INVALID packet with digital signature, every host receiving this packet can update its route to the destination host through the path it gets the INVALID packet. Enable new sequence: When the destination sequence reaches its max number (0x7fffffff) and needs to round back to 0, the host sends an INVALID packet with current sequence = 0x7fffffff, new sequence = 0.

Reverse Labeling Restriction (con’d) Packets from suspicious hosts Route request: If the request is from suspicious hosts, ignore it. Route reply: If the previous hop is suspicious and the query destination is not the previous hop, the reply will be ignored. Route error: will be processed as usual. RERR will activate re-discovery, which will help to detect attacks on destination sequence. INVALID: if the sender is suspicious, the packet will be processed but the blacklist will be ignored.

Simulation parameter Simulation duration1000 seconds Simulation area1000 * 1000 m Number of mobile hosts30 Transmission range250 m Pause time between the host reaches current target and moves to next target 0 – 60 seconds Maximum speed5 m/s Number of CBR connection25/50 Packet rate2 pkt / sec

Reverse Labeling Restriction (con’d) Simulation results The following metrics are chosen: Delivery ratio (evaluate effectiveness of RLR) Number of normal hosts that identify the attacker (evaluate accuracy of RLR) Number of normal hosts that are marked as attacker by mistake (evaluate accuracy of RLR) Normalized overhead (evaluate communication overhead of RLR) Number of packets to be signed (evaluate computation overhead of RLR)

Reverse Labeling Restriction (con’d) X-axis is host pause time, which evaluates the mobility of host. Y- axis is delivery ratio. 25 connections and 50 connections are considered. RLR brings a 30% increase in delivery ratio. 100% delivery is difficult to achieve due to network partition, route discovery delay and buffer.

X-axis is number of attackers. Y-axis is delivery ratio. 25 connections and 50 connections are considered. RLR brings a 20% to 30% increase in delivery ratio. Reverse Labeling Restriction (con’d)

30 hosts, 25 connections30 hosts, 50 connections Host Pause time (sec) # of normal hosts identify the attacker # of normal hosts marked as malicious # of normal hosts identify the attacker # of normal hosts marked as malicious The accuracy of RLR when there is only one attacker in the system

Reverse Labeling Restriction (con’d) 30 hosts, 25 connections30 hosts, 50 connections # of attackers# of normal hosts identify all attackers # of normal hosts marked as malicious # of normal hosts identify all attackers # of normal hosts marked as malicious The accuracy of RLR when there are multiple attackers

X-axis is host pause time, which evaluates the mobility of host. Y-axis is normalized overhead (# of control packet / # of delivered data packet). 25 connections and 50 connections are considered. RLR increases the overhead slightly. Reverse Labeling Restriction (con’d)

X-axis is host pause time, which evaluates the mobility of host. Y-axis is the number of signed packets processed by every host. 25 connections and 50 connections are considered. RLR does not severely increase the computation overhead to mobile host.

Reverse Labeling Restriction (con’d) X-axis is number of attackers. Y-axis is number of signed packets processed by every host. 25 connections and 50 connections are considered. RLR does not severely increase the computation overhead of mobile host.

Robustness of RLR If the malicious host sends false INVALID packet Because the INVALID packets are signed, it cannot send the packets in other hosts’ name If it sends INVALID in its own name, the reverse labeling procedure will converge on the malicious host and identify the attacker. The normal hosts will put it into their blacklists.

Robustness of RLR If the malicious host frames other innocent hosts by sending false Blacklist If the malicious host has been identified, the blacklist will be ignored If the malicious host has not been identified, this operation can only lower the threshold by one. If the threshold is selected properly, it will not impact the identification results.

Robustness of RLR If the malicious host only sends false destination sequence about some special host The special host will detect the attack and send INVALID packets. Other hosts can establish new routes to the destination by receiving the INVALID packets.

Securing Ad Hoc networks -- Establish trust relationship in open area Evaluate known knowledge  Known knowledge : Interpretations of observations Recommendations  An algorithm that evaluates trust among hosts is being developed  A host’s trustworthiness affects the trust toward the hosts on the route Predict of trustworthiness of a host  Current approach uses the result of evaluation as prediction.

Securing Ad Hoc networks -- Establish trust relationship in open area What trust information is needed when adding/ removing suspicious host from blacklist?  The trust opinion of S1 towards an entity S2 in a certain context R What characteristics of trust need to be included in the model?  Dependability: combination of competence, benevolence, and integrity  Predictability

Securing Ad Hoc networks -- Establish trust relationship in open area What is the suitable representation of trust? A random variable is used to represent trust so that the inherent uncertainty of deriving trust from behaviors can be accommodated. How to represent the interpretation of an observation? A trust distribution function

Further Work Design a set of formalized criteria to evaluate identification algorithms Study more features of Ad Hoc networks and exploit their vulnerability Simulate attacks on RLR, examine its robustness Integrate with research on trust Methods to identify the non-attackers and release them from blacklist Mechanisms to release hosts from the permanent blacklist

More information may be found at Our papers and tech reports W. Wang, Y. Lu, B. Bhargava, On vulnerability and protection of AODV, CERIAS Tech Report TR B. Bhargava, Y. Zhong, Authorization based on Evidence and Trust, in Proceedings of Data Warehouse and Knowledge Management Conference (DaWak), 2002 Y. Lu, B. Bhargava and M. Hefeeda, An Architecture for Secure Wireless Networking, IEEE Workshop on Reliable and Secure Application in Mobile Environment, 2001 W. Wang, Y. Lu, B. Bharagav, “On vulnerability and protection of AODV”, in proceedings of ICT W. Wang, Y. Lu, B. Bhargava, “On security study of two distance vector routing protocols for two mobile ad hoc networks”, in proceedings of PerCOm 2003.

Selected References [1] C. Perkins and E. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, [2] C. Perkins, “Highly dynamic destination-sequenced distancevector routing (DSDV) for mobile computers,” in Proceedings of SIGCOMM, [3] Z. Haas and M. Pearlman, “The zone routing protocol (ZRP) for ad hoc networks,” IETF Internet Draft, Version 4, July, [4] T. Camp, J. Boleng, B. Williams, L. Wilcox, and W. Navidi, “Performance comparison of two location based routing protocols for ad hoc networks,” in Proceedings of the IEEE INFOCOM, [5] Z. Haas, J. Halpern, and L. Li, “Gossip-based ad hoc routing,” in Proceedings of the IEEE INFOCOM, [6] C. Perkins, E. Royer, and S. Das, “Performance comparison of two on-demand routing protocols for ad hoc networks,” in Proceedings of IEEE INFOCOM, [7] S. Das and R. Sengupta, “Comparative performance evaluation of routing protocol for mobile, ad hoc networks,” in Proceedings of IEEE the Seventh International Conference on Computer Communications and Networks, [8] L. Venkatraman and D. Agrawal, “Authentication in ad hoc networks,” in Proceedings of the 2nd IEEE Wireless Communications and Networking Conference, 2000.

Selected References [9] Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,” in Proceedings of ACM MobiCom, [10] Z. Zhou and Z. Haas, “Secure ad hoc networks,” IEEE Networks, vol. 13, no. 6, pp. 24–30, [11] V. Bharghavan, “Secure wireless LANs,” in Proceedings of the ACM Conference on Computers and Communications Security, [12] P. Sinha, R. Sivakumar, and V. Bharghavan, “Enhancing ad-hoc routing with dynamic virtual infrastructures.,” in Proceedings of IEEE INFOCOM, [13] S. Bhargava and D. Agrawal, “Security enhancements in AODV protocol for wireless ad hoc networks,” in Proceedings of Vehicular Technology Conference, [14] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad hoc networks,” in Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), [15] P. Albers and O. Camp, “Security in ad hoc network: A general id architecture enhancing trust based approaches,” in Proceedings of International Conference on Enterprise Information Systems (ICEIS), 2002.