Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
Issa Khalil, Saurabh Bagchi IEEE Transactions on Mobile Computing, 2011 Presented by Yang Chen
1 CS6204 – Mobile Computing
Networks: Detection and Countermeasure Issa Khalil, Saurabh Bagchi - - PowerPoint PPT Presentation
Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure Issa Khalil, Saurabh Bagchi IEEE Transactions on Mobile Computing, 2011 Presented by Yang Chen 1 CS6204 Mobile Computing Khalil-TMC11 Outline Background and
1 CS6204 – Mobile Computing
Khalil-TMC11
CS6204 – Mobile Computing 2
Khalil-TMC11
CS6204 – Mobile Computing 3
Khalil-TMC11
Monitoring: non-modification, acceptable delay,
CS6204 – Mobile Computing 4
Khalil-TMC11
CS6204 – Mobile Computing 5
Khalil-TMC11
CS6204 – Mobile Computing 6
Khalil-TMC11
node i revoke j from neighbor list (direct isolation), send alert neighbor of node i, verify it. When get enough alert, revoke j
Detection confidence index γ
CS6204 – Mobile Computing 7
Khalil-TMC11
CS6204 – Mobile Computing 8
Khalil-TMC11
M drops packet without
E is accused by guards
CS6204 – Mobile Computing 9
Khalil-TMC11
CS6204 – Mobile Computing 10
Khalil-TMC11
CS6204 – Mobile Computing 11
Khalil-TMC11
CS6204 – Mobile Computing 12
Khalil-TMC11
Key observation: make sure the number of unsatisfied
CS6204 – Mobile Computing 13
Khalil-TMC11
Guards collect info. during route establishment phase
CS6204 – Mobile Computing 14
Khalil-TMC11
CS6204 – Mobile Computing 15
Khalil-TMC11
CS6204 – Mobile Computing 16
Khalil-TMC11
Probability of detection Probability of isolation Probability of false detection or isolation Probability of framing detection or isolation
CS6204 – Mobile Computing 17
Khalil-TMC11
G misses both Pin and Pmr missed detection G misses Pin but gets Pmr detection as fabricate G gets Pin but misses Pmr detection as drop G gets both Pin and Pmr successful misrouting detection for
CS6204 – Mobile Computing 18
Khalil-TMC11
Case 1: missed detection Case 4: normal Cases 2&3: detection of malicious nodes and false detection for good
𝜈 > 𝛾, otherwise, 𝑄𝑒𝑓𝑢𝑓𝑑𝑢 = 0
CS6204 – Mobile Computing 19
Khalil-TMC11
CS6204 – Mobile Computing 20
Khalil-TMC11
CS6204 – Mobile Computing 21
Khalil-TMC11
CS6204 – Mobile Computing 22
Khalil-TMC11
CS6204 – Mobile Computing 23
Khalil-TMC11
CS6204 – Mobile Computing 24
Khalil-TMC11
CS6204 – Mobile Computing 25
Khalil-TMC11
CS6204 – Mobile Computing 26
Khalil-TMC11
CS6204 – Mobile Computing 27
Khalil-TMC11
CS6204 – Mobile Computing 28
Khalil-TMC11
CS6204 – Mobile Computing 29
Khalil-TMC11
CS6204 – Mobile Computing 30
Khalil-TMC11
CS6204 – Mobile Computing 31
Khalil-TMC11
CS6204 – Mobile Computing 32
Khalil-TMC11
CS6204 – Mobile Computing 33
Khalil-TMC11
CS6204 – Mobile Computing 34
Khalil-TMC11
CS6204 – Mobile Computing 35
Khalil-TMC11
BLM decreases faster: a) fail to detect malicious,
CS6204 – Mobile Computing 36
Khalil-TMC11
CS6204 – Mobile Computing 37
Khalil-TMC11
CS6204 – Mobile Computing 38
Khalil-TMC11
CS6204 – Mobile Computing 39
Khalil-TMC11
CS6204 – Mobile Computing 40
Khalil-TMC11
CS6204 – Mobile Computing 41
Khalil-TMC11
CS6204 – Mobile Computing 42
Khalil-TMC11
CS6204 – Mobile Computing 43