Abstract
Packet traceback in mobile ad hoc networks (MANETs) is a technique for identifying the source and intermediaries of a packet forwarding path. While many IP traceback techniques have been introduced for packet attribution in the Internet, they are not directly applicable in MANETs due to unique challenges of MANET environments.
In this work, we make the first effort to quantitatively analyze the impacts of node mobility, attack packet rate, and path length on the traceability of two types of well-known IP traceback schemes: probabilistic packet marking (PPM) and hash-based logging. We then present the design of an authenticated K-sized Probabilistic Packet Marking (AK-PPM) scheme, which not only improves the effectiveness of source traceback in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve asymptotically one-hop precise, and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Snoeren, A.C., Kohno, T., Savage, S., Vahdat, A., Voelker, G.M.: Collaborative research: Nets-find: Privacy-preserving attribution and provenence. Technical report, University of California, San Diego and University of Washington (2010)
Hunker, J., Hutchinson, B., Margulies, J.: Role and challenges for sufficient cyber-attack attribution. Technical report, Instituite for Information Infrastructure Protection (2008)
Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. SIGCOMM Comput. Commun. Rev. 34, 39–53 (2004)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: Proc. of Infocom (2004)
Wang, X., Govindan, K., Mohapatra, P.: Provenance-based information trustworthiness evaluation in multi-hop networks. In: Proc. of GLOBECOM 2010 (2010)
Dean, D., Franklin, M., Stubblefield, A.: An Algebraic Approach to IP Traceback. ACM Trans. on Information and System Security 5, 119–137 (2002)
Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Kent, S., Strayer, W.: Hash-Based IP traceback. In: Proc. of the ACM SIGCOMM, pp. 3–14 (2001)
Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: IEEE Infocom 2001, pp. 878–886 (2001)
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network support for IP traceback. ACM Trans. on Networking 9(3), 226–237 (2001)
Sung, M., Xu, J., Li, J., Li, L.: Large-scale ip traceback in high-speed internet: practical techniques and information-theoretic foundation. IEEE/ACM Trans. Netw. 16, 1253–1266 (2008)
Jeong, J., Guo, S., Gu, Y., He, T., Du, D.: TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks. In: ICDCS 2009, pp. 743–757 (2009)
Thing, V., Lee, H.: Ip traceback for wireless ad-hoc networks. In: Proc. of Vehicular Technology Conference, VTC 2004-Fall (2004)
an Huang, Y., Lee, W.: Hotspot-based traceback for mobile ad hoc networks. In: Proc. of WiSec 2005, pp. 43–54 (2005)
Kim, Y., Helmy, A.: SWAT: Small world-based attacker traceback in ad-hoc networks. In: Proc. of MobiQuitous 2005, pp. 85–96 (2005)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the ACM Conference on Computer and Communications Security 2003, pp. 52–61 (2003)
Du, W., Deng, J., Han, Y., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of CCS 2003, pp. 42–51 (2003)
Blundo, C., Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: LHAP: a lightweight network access control protocol for ad hoc networks. J. of Ad Hoc Networks 4, 567–585 (2006)
Sourcefire, Inc.: Snort, http://www.snort.org/
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. of MobiCom 2000, pp. 255–265 (2000)
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for ip traceback. SIGCOMM Comput. Commun. Rev. 30, 295–306 (2000)
Sadagopan, N., Bai, F., Krishnamachari, B., Helmy, A.: Paths: analysis of path duration statistics and their impact on reactive manet routing protocols. In: Proc. of MobiHoc 2003, pp. 245–256 (2003)
Feller, W.: An Introduction to Probability Theory and Applications, 3rd edn., vol. 1. John Wiley & Sons Publishers, New York (1968); vol. 2, 2nd edn. (1971)
Kuzmanovic, A., Knightly, E.W.: Low-rate tcp-targeted denial of service attacks. In: Proc. of SIGCOMM 2003, pp. 75–86 (2003)
Adler, M.: Tradeoffs in probabilistic packet marking for IP traceback. In: Proc. of STOC 2002, pp. 407–418 (2002)
Goodrich, M.: Efficient packet marking for large-scale IP traceback. In: Proc. of the 9th ACM CCS Conference, pp. 117–126 (2002)
Ye, F., Yang, H., Liu, Z.: Catching ”moles” in sensor networks. In: Proc. of ICDCS 2007, p. 69 (2007)
Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ubiquitous computing. Computer, 22–26 (2002)
John, E., Kobza, S.H.J., Vaughan, D.E.: A survey of the coupon collectors problem with random sample sizes. Methodology and Comp. in Applied Probability 9, 1387–5841 (2007)
Sellke, T.M.: How many iid samples does it take to see all the balls in a box? The Annals of Applied Probability 5, 294–309 (1995)
Zarai, F., Rekhis, S., Boudriga, N., Zidane, K.: Sdppm: An ip traceback scheme for manet. In: Proc. of ICECS 2005, pp. 1–4 (2005)
Kim, I.Y., Kim, K.C.: A resource-efficient ip traceback technique for mobile ad-hoc networks based on time-tagged bloom filter. In: Proc. of ICCIT 2008, pp. 549–554 (2008)
Hsu, H., Sencun Zhu, A.H.: A hotspot-based protocol for attack traceback in mobile ad hoc networks. In: Proc. of ASIACCS 2010, pp. 333–336 (2010)
Thomas, W., Doeppner, P.N., Klein, A.K.: Using router stamping to identify the source of ip packets. In: Proc. of CCS 2000, pp. 184–189 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, Z., Hsu, H., Chen, X., Zhu, S., Hurson, A.R. (2012). AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds) Research in Attacks, Intrusions, and Defenses. RAID 2012. Lecture Notes in Computer Science, vol 7462. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33338-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-33338-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33337-8
Online ISBN: 978-3-642-33338-5
eBook Packages: Computer ScienceComputer Science (R0)