A Two-Layer IP Hopping-Based Moving Target Defense Approach to Enhancing the Security of Mobile Ad-Hoc Networks

被引:14
作者
Wang, Pengkun [1 ]
Zhou, Momiao [1 ,2 ]
Ding, Zhizhong [1 ,2 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei 230009, Peoples R China
[2] Hefei Univ Technol, Anhui Prov Key Lab Ind Safety & Emergency Technol, Hefei 230009, Peoples R China
关键词
MANET; network security; IP hopping; moving target defense; anti-intrusion;
D O I
10.3390/s21072355
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Mobile ad-hoc networks (MANETs) have great potential applications in military missions or emergency rescue due to their no-infrastructure, self-organizing and multi hop capability characteristics. Obviously, it is important to implement a low-cost and efficient mechanism of anti-invasion, anti-eavesdropping and anti-attack in MANETs, especially for military scenarios. The purpose of intruding or attacking a MANET is usually different from that of wired Internet networks whose security mechanism has been widely explored and implemented. For MANETs, moving target defense (MTD) is a suitable mechanism to enhance the network security, whose basic idea is to continuously and randomly change the system parameters or configuration to create inaccessibility for intruders and attackers. In this paper, a two-layer IP hopping-based MTD approach is proposed, in which device IP addresses or virtual IP addresses change or hop according to the network security status and requirements. The proposed MTD scheme based on the two-layer IP hopping has two major advantages in terms of network security. First, the device IP address of each device is not exposed to the wireless physical channel at all. Second, the two-layer IP hops with individual interval and rules to obtain enhanced security of MANET while maintaining relatively low computational load and communication cost for network control and synchronization. The proposed MTD scheme is implemented in our developed MANET terminals, providing three level of network security: anti-intrusion in normal environment, intrusion detection in offensive environment and anti-eavesdropping in a hostile environment by combining the data encryption technology.
引用
收藏
页数:15
相关论文
共 35 条
[1]  
Albanese M, 2013, IEEE CONF COMM NETW, P278, DOI 10.1109/CNS.2013.6682717
[2]  
[Anonymous], 2011, P SIM US MATLAB INT
[3]   Defending against hitlist worms using network address space randomization [J].
Antonatos, S. ;
Akritidis, P. ;
Markatos, E. P. ;
Anagnostakis, K. G. .
COMPUTER NETWORKS, 2007, 51 (12) :3471-3490
[4]   ChameleonSoft: A Moving Target Defense System [J].
Azab, Mohamed ;
Hassan, Riham ;
Eltoweissy, Mohamed .
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, :241-250
[5]   Fast IP Hopping Randomization to Secure Hop-by-Hop Access in SDN [J].
Chang, Sang-Yoon ;
Park, Younghee ;
Babu, Bhavana Babu Ashok .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (01) :308-320
[6]   Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [J].
Cho, Jin-Hee ;
Sharma, Dilli P. ;
Alavizadeh, Hooman ;
Yoon, Seunghyun ;
Ben-Asher, Noam ;
Moore, Terrence J. ;
Kim, Dong Seong ;
Lim, Hyuk ;
Nelson, Frederica F. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :709-745
[7]  
Clark A, 2013, IEEE DECIS CONTR P, P678, DOI 10.1109/CDC.2013.6759960
[8]  
Dunlop M, 2011, 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, P1321, DOI 10.1109/MILCOM.2011.6127486
[9]   OTPaaS-One Time Password as a Service [J].
Erdem, Emir ;
Sandikkaya, Mehmet Tahir .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) :743-756
[10]  
Floissac N., 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, P43, DOI 10.1109/FDTC.2011.15