Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges

被引:67
作者
Djahel, Soufiene [1 ]
Nait-Abdesselam, Farid [1 ]
Zhang, Zonghua
机构
[1] Univ Sci & Technol Lille, Dept Comp Sci, Lille, France
关键词
Ad Hoc Networks; Routing Protocols Security; Packet Dropping Attack; Black Hole Attack; SECURITY; AUTHENTICATION;
D O I
10.1109/SURV.2011.072210.00026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other's packets in order to enable out of range communication. However, in hostile environments, some nodes may deny to do so, either for saving their own resources or for intentionally disrupting regular communications. This type of misbehavior is generally referred to as packet dropping attack or black hole attack, which is considered as one of the most destructive attacks that leads to the network collapse. The special network characteristics, such as limited battery power and mobility, make the prevention techniques based on cryptographic primitives ineffective to cope with such attack. Rather, a more proactive alternative is required to ensure the safety of the forwarding function by staving off malicious nodes from being involved in routing paths. Once such scheme fails, some economic-based approaches can be adopted to alleviate the attack consequences by motivating the nodes cooperation. As a backup, detection and reaction schemes remain as the final defense line to identify the misbehaving nodes and punish them. In this paper, we make a comprehensive survey investigation on the state-of-the-art countermeasures to deal with the packet dropping attack. Furthermore, we examine the challenges that remain to be tackled by researchers for constructing an in-depth defense against such a sophisticated attack.
引用
收藏
页码:658 / 672
页数:15
相关论文
共 51 条
[21]   A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS [J].
Djenouri, Djamel ;
Khelladi, Lyes ;
Badache, Nadjib .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04) :2-28
[22]   New approach for selfish nodes detection in mobile ad hoc networks [J].
Djenouri, Djamel ;
Badache, Nadjib .
2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, :288-294
[23]  
Fahad T., 2007, P 3 INT S INF ASS SE
[24]  
Fischlin M., 2004, P RSA SEC CRYPT TRAC
[25]  
Gerhards-Padilla E., 2007, P 33 IEEE C LOC COMP
[26]   A survey of secure wireless ad hoc routing [J].
Hu, YC ;
Perrig, A .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :28-39
[27]  
JAHNKE M, 2004, P NATO RTO IST S AD
[28]  
JI Z, 2006, P 3 ANN IEEE COMM SO
[29]  
Kannhavong B., 2008, P INT C COMM ICC 200
[30]  
Kannhavong B, 2006, GLOB TELECOMM CONF