A Comprehensive Analysis of DoS Attacks and Countermeasures In Wireless Mesh Networks Bayan Hallaj1, Mohammad Masdari2 1Computer Engineering Department, Islamic Azad University, Urmia Branch, Urmia, bayan.hallaj@gmail.com 2Computer Engineering Department, Islamic Azad University, Urmia Branch, Urmia, Iran Iran, m.masdari@iaurmia.ac.ir Abstract Wireless mesh networks or WMNs have emerged as a key technology for next-generation wireless networking and has characteristics such as simplicity, low cost, better performance, wider coverage area, self-healing and etc. Due to the open nature of WMNs, wireless links, lack of physical protection, frequent changes in topology and membership, these networks are susceptible to various kinds of attacks. As a result, the security a serious concern to be addressed. A major attack occurring in a WMN is the Denial of Service (DoS) attack which will make the server overloaded with many requests and will make that unable to service the requests from the legitimate users. In this paper, various forms of DoS attacks are investigated and classified in each layer of network. Also we have discussed about countermeasures against these attacks. So their countermeasures are listed, there are definition of their advantages and disadvantages and they have been analyzed to choose the best countermeasure. Keywords: Attack, mesh network, DoS, Countermeasures 1 defense mechanisms that each mechanism has its advantages and disadvantages and usage of that depends on the network majorities and priorities. Then we discuss various forms of countermeasures against all of DoS attacks in each layer, and analyze the countermeasures. So WMN admin can choose the most appropriate mechanism to achieve a secure network. The rest of paper is organized as follows: in section 2 we introduce DoS attacks in WMNs. Section 3 reviews the countermeasures for WMNs. At last at the end of the paper we evaluate the different kinds of DoS attacks and countermeasure methods. Introduction Wireless Mesh Networks or WMNs are multi-hop wireless communication among different nodes are dynamically self-organized and self-configured, with the nodes in the network automatically establishing an ad-hoc network and maintaining the mesh connectivity. WMNs are emerged as a promising concept to meet the challenges in wireless networks such as flexibility, adaptability, reconfigurable architecture etc. A WMN is a mesh network established through the connection of wireless access points installed for each network user's local. Each network user sends data to the next node. The WMN infrastructure is decentralized because each node need only transmit data to the next node. Wireless mesh networking can be used in remote areas and small business operating in rural neighborhoods to connect their networks together for affordable Internet connections [1, 2]. Denial-of-Service (DoS) attacks are attacks against availability, attempting to prevent legitimate users from accessing the network. A DoS attack makes a computer or network resource unavailable for its intended users. It includes the combined efforts of a person or a group of persons to prevent the service from functioning efficiently, temporarily or indefinitely. DoS attack makes the server or the victim overloaded with huge number of requests, so that the server won't be able to service the legitimate user requests. The main goal of a DoS attack is to flood the network with service requests to the server. This can lead to the server being unable to service all the requests, thereby denying offering service to legitimate requests [3], [4], [5]. In this paper, we study DoS attacks and countermeasures in WMN in different layers. Because of the variety of DoS attacks in WMNs, we classify all DoS attacks an attacker can carry out in different 2 DoS attacks in WMNs A DoS attack is one that attempts to prevent the victim from being able to use all or part of his/her network connection. Denial of service attacks may extend to all layers of the protocol stack. They target service availability or authorized users' access to a service provider [6]. In this section we will discuss the different ways that an attacker can carry out “DoS attacks” in different layers of the protocol. All these methods are listed and a brief explanation of what each attack means is explained in this section. 2.1 DoS attacks in Physical Layer The physical layer is responsible for frequency selection, carrier frequency generation, signal detection, modulation, and data encryption. As with any radiobased medium, the possibility of a jamming attack in WMNs is high since this attack can be launched without much effort and sophistication. Jamming is a type of attack which interferes with the radio frequencies that the nodes use in a WMN for communication [7, 8]. layers, listing and giving a brief explanation of them. For every attack, network admin has some 1 2.1.1 Jamming attack Jamming is the most common attack in physical layer that can drop or reorder transmission of signals. Jamming signals in the form of continuous or periodic noise are generated to disrupt the transmission of bits in the physical layer. The Jamming signal can be reactive in which case it intercepts the channel only when an ongoing transaction is detected and disrupts the transmission. The jamming signal can significantly reduce the capacity of the channel [9, 10]. All Kinds of jamming attacks are as follows: Selective Jamming attack o o 2.2 2.2.3 Neighbor Attack Neighbor attacker deceits nodes that are out of each other's communication range to communicate by making them believe that they are neighbors. It is similar to black hole attack but instead of dropping packets it creates packet loss by creating a false link that does not exists [9]. 2.2.4 Sybil Attack A Sybil attack is the form of attack where a malicious node creates multiple identities in the network, each appearing as a legitimate node [7]. Here the node fakes multiple identities and claims itself to be distinct nodes on the network though it is just a single malicious node. The Sybil attack hampers the routing protocols by creating false links between an honest and a malicious node. The attack can have detrimental effects on resource allocation, misbehavior detection and voting techniques in the wireless networks [9]. Channel Selective Jamming attack Data Selective Jamming attack Scrambling attack Resource Unlimited Attack (RUA) Preamble attack SFD attack Reactive attack HR (Hit and Run) attack Monopolizing attack Symbol attack 2.2.5 Rushing Attack To intrude into the forwarding group, the attacker suppresses the flooding of Route Request packets (RREQ) from legitimate nodes. The main goal of this attack is to suppress valid paths from being established or to increase its chance of it being part of the optimal path selected. It rushes its RREQ packet to its neighbor nodes before any other legitimate nodes can broadcast their RREQ packets. As a result the protocol processes or forwards only the first RREQ packet it receives and drops the others. This chain continues and the packet is broadcasted across the network increasing its chances of being a part of the selected route [9]. DoS attacks in Network Layer The router layer is more susceptible to dropping of packets or misrouting since multiple hops are involved in transmission of packets. The mobility of the nodes, limited bandwidth, signal strength, congestion and routing protocols make detection of various attacks in this layer difficult. The attacks mainly target the routing protocols to misroute packets or drop them, poison node caches to store incorrect paths and disturb the normal network formation. More of these attacks can also be caused by legitimate behavior of network such as sudden burst of network traffic, link failures, low signal and battery exhaustion. Due to this, detection of attacks and finding the actual reason for the failure are very complex in the network layer. The different attacks that can be carried out are explained below: [9] 2.2.6 Blackhole attack In a Blackhole attack the malicious node will always advertise in the network that it has a fresher route to the destination by setting the sequence number to a large value and will reply to the RREQ before other routers send a reply. Thus the attacker router will attract all the traffic in its transmission range towards itself and then may drop the packets [12]. Almost all the traffic within the neighborhood will be directed toward the malicious node, which may drop all the packets [13]. The malicious node after intruding into the forwarding group, drops all the packets that it has to route to the destination [9]. Blackhole attack can be classified into two types. Single black hole attack and Collaborative black hole attack. In single black hole attack one malicious node is there. It claims itself that its path is shortest to destination. This node drops routing packets instead of forward packet to destination. In collaborative black hole attack minimum two malicious nodes are there and transfers packet from one malicious node to another. The aim of black hole attacker is to attract traffic towards it and block data packets by dropping them [14]. 2.2.1 Byzantine Attack In this attack, an adversary has full control over an authenticated node in the network. All integrity and authentication measures taken by the security protocols are of little use when the node is hijacked. This hijacked node is misused to cause several other attacks like black hole, wormhole and etc [9, 11]. 2.2.2 Jelly fish attack A jelly fish attack is similar to black hole attack where the attacker intrudes into the forwarding group to tunnel the packets to an adversary. Here packets are not dropped instead it increases the end to end delay of the transmission by unnecessarily delaying the packet forwarding to the next hop, thereby causing frequent timeouts and retransmission of packets. It is difficult to identify this attack because we do not know if the packet loss was due to network congestion or link failure. It plunges the network throughput and delay jitter [9]. 2 SYN request is spoofed, the victim server will never receive the final ACK packet to complete the three-way handshake. Flooding spoofed SYN requests can easily exhaust the victim server’s backlog queue, causing all the incoming SYN requests to be dropped. The stateless and destination-based nature of Internet routing infrastructure cannot differentiate a legitimate SYN from a spoofed one, and TCP does not offer strong authentication on SYN packets. Therefore, under SYN flooding attacks, the victim server cannot single out, and respond only to, legitimate connection requests while ignoring the spoofed [16, 17]. 2.2.7 Grayhole attack Selective forwarding attack or Grayhole attack is a kind of Denial of Service (DoS) attack. In this, an adversary first exhibits the same behavior as an honest node during the route discovery process, and then silently drops some or all of the data packets sent to it for further forwarding even when no congestion occurs. The malicious nodes could degrade the network performance; disturb route discovery process, etc. In a wireless network, it is hard to detect the presence of such attacker because the packet loss over the wireless link can be due to bad channel quality, collisions, intentional dropping etc. If an attacker drops all the packets, the attack is then called black hole attack. To launch a selective forwarding attack, an attacker may compromise or hijack the mesh router that belongs to the network, known as internal attacks; or attack the network from outside, known as external attacks [15]. 2.3.2 De-synchronization attack De-synchronization refers to the disruption of an existing connection. An attacker may, for example, repeatedly spoof messages to an end host causing the host to request the retransmission of missed frames. If timed correctly, an attacker may degrade or even prevent the ability of the end hosts to successfully exchange data causing them instead to waste energy attempting to recover from errors which never really exist [18]. By continuously causing retransmission requests, this attack can eventually prevent the endpoints from exchanging any useful information, other than quickly drain all the power resources of the attacked nodes [19]. 2.2.8 Wormhole attack The routing path between the source and the destination is tunneled by a set of colluding malicious nodes that deceits source nodes to choose its optimal path compared to all other paths to the destination by establishing an off - line high speed link between them and thereby invading into the forwarding group. This path is called as a “Wormhole” since the adversary nodes have virtually created a tunnel between the source and destination. It sniffs the packets from the sender and communicates it to other end of the tunnel and the packet is replayed at this end locally. Since the entire traffic is passed between the malicious nodes, the packets can be dropped to cause DoS attack or intercepted to cause “man in the middle attack”. As long as the worm hole exists it makes sure that no other paths can be chosen and hence disrupts the network topology. This is one of the strongest attacks where even if two adversary nodes collude the attack can be carried out. In the worst case we can have an entire set of nodes forming the network overlay to be colluding to disrupt the network traffic. Such worm hole attacks are called as super wormhole attacks [9, 13]. 2.3 3 Countermeasures for DoS attacks In this section we introduce the different countermeasures that have been implemented to combat DoS attacks in different layers. The countermeasures explain in detail the principle they are based on and the limitations of each technique. 3.1 Countermeasures for DoS Attacks in Physical Layer Jamming is the most common DoS attackin physical layer. In this section, solutions to detect or prevent DoS attacks in physical layer are classified and explained. DoS Attacks in Transpoet Layer The attacks that can be launched on the transport layer of a WMN are flooding attack and desynchronization attack. 3.1.1 Jamming Attack Detection Low throughput, low packet delivery ratio (PDR) and high packet latency are indicators of a jamming attack. However, these indicators are also present, when the network is congested. Thus, better metrics should be used to detect a jamming attack and differentiate it from other network conditions. Two types of jamming detection approaches are Signal strength consistency and location consistency. In signal strength consistency approach, a station is suspected to be a victim of a jammer station, if the measured PDR is low and the measured average signal strength of incoming signals is high. Signal strength level is an indicator of a high quality channel. An unexpectedly high frame loss rate in such a channel is an indication of an active jammer station. Location consistency is conceptually similar to signal strength consistency. If the PDR of a data flow 2.3.1 SYN flooding attack The SYN flooding attacks exploit the TCP’s three-way handshake mechanism and its limitation in maintaining half-open connections. When a server receives a SYN request, it returns a SYN/ACK packet to the client. Until the SYN/ACK packet is acknowledged by the client, the connection remains in half-open state for a period of up to the TCP connection timeout, which is typically set to 75 seconds. The server has built in its system memory a backlog queue to maintain all half-open connections. Since this backlog queue is of finite size, once the backlog queue limit is reached, all connection requests will be dropped. If a 3 between a sender and a receiver is extraordinarily low despite the fact that these stations are physically close enough (it is possible to estimate the distance between 802.11 stations by using signal strength, up to a few meters certainty) then a jammer station is suspected to be present in the surrounding area [4, 20]. proportion to the number of bits being used. The receiver can use the spreading code with the signal to recover the original data.In frequency hopping spread spectrum (FHSS), signals are transmitted by rapidly switching a carrier signal among many frequency channels using a pseudo-random sequence which is known to both the transmitter and the receiver [7]. 3.1.2 Table 1 presents a summary of countermeasures against DoS attacks in physical layer, advantages and disadvantages of them. Counter the Intended Actions of the Jammer Station In case the jammer station is equipped with a narrow band transmitter, rapid frequency hopping can be a highly effective method in combating the jammer's actions. A single station's jamming attacks are experimentally shown to be relatively ineffective against legitimate stations rapid frequency hopping action. If the number of jammer stations increases then the effectiveness of rapid frequency hopping gracefully decreases until all the channels (11 overlapping channels in North America) are jammed by at least one jammer station. Since implementing rapid frequency hopping brings extra overhead, proactive utilization of such prevention methods is not very efficient if there is no ongoing DoS attack detected [4, 21]. 3.1.4 Countering Channel-Selective Attacks Several anti-jamming methods have been proposed to address channel-selective attacks from insider nodes. All methods trade communication efficiency for stronger resilience to jamming. Three anti-jamming methods are described in the following: Replication of control information Assignment of unique pseudo-noise codes Elimination of secrets 3.1.5 Countering Data-Selective Jamming Attacks An intuitive solution for preventing packet classification is to encrypt transmitted packets with a secret key. While a shared key suffices to protect pointto-point-communications, for broadcast packets, this key must be shared by all intended receivers. Thus, this key is also known to an inside jammer. In symmetric encryption schemes based on block encryption, reception of one cipher text block is sufficient to obtain 3.1.3 Spread Spectrucm Techniques The traditional defenses against jamming include spread spectrum techniques such as direct sequence and frequency hopping. In direct sequence spread spectrum (DSSS), each data bit in the original signal is represented by multiple bits in the transmitted signal using a spreading code. The spreading code spreads the signal over a wider frequency band which is directly in Table 1: Countermeasures Against DoS Attack in Physical Layer Countermeasure Method Spread spectrum Replication of control information Attack Selective jamming attacks Channel selective jamming Description Advantages Every bit in main signal by several bit in transmission signal presented Detection & Prevention Implementation is hard Every channel bandwidth control for jamming attacks [22]. Anti-jamming Limiting bandwidth the pseudo-noise code used to spread each packet is not known a priori Assignment of unique pseudonoise codes Channel selective jamming Dynamically vary the location of the broadcast channel, based on the physical location of the communicating nodes [23]. Anti-jamming Elimination of secrets Channel selective jamming Attempt to eliminate the use of common secrets for protecting broadcast communications. Avoids secrets in the first place [22]. An inside adversary can only attempt to guess it, with a limited probability of success. Counter data selective jamming attacks Cad Resource unlimited attack Every packets for denial of jamming encrypt &classifying with a shared code key Current encryption mechanisms used in these broadband networks are WEP, DES, and AES Every channel control for bandwidth for high rate change Multi-hop forwarding Spatial retreat Rapid frequency hopping Preamble attack Relay traffic receive credit in return WEP ,DES,AES Data selective jamming scrambling Disadvantages 4 Denial of outside attacker Delay in transmission Increasing security High cost implement Denial of planning attacks Implementing needs clear metrics Overcome on attack Utilize more bandwidth the corresponding plaintext block, if the decryption key is known. Hence, encryption alone does not prevent insiders from classifying broadcasted packets. To prevent classification, a packet must remain hidden until it is transmitted in its entirety. One possible way for temporarily hiding the transmitted packet is to employ commitment schemes. In a commitment scheme, the transmitting node hides the packet by broadcasting a committed version of it [23]. 3.2 states. Hence in the case of dense networks where there are many disjoint paths the network takes time to identify the reliable link between the source and the destination because it considers only one path in every transfer. This approach can get worse when the number of adversary nodes are more and are participating in many paths. This approach is fast for sparse network [9]. A summary of countermeasures against Byzantine attacks in network layer, advantages and disadvantages of them has been listed in table 2. Secure Data Transmission (SDT) is based on the fundamental principle that the data transmission is successful only when the source receives an ACK from the destination node. This approach only helps us to detect the path in which an adversary node is present but does not isolate the node itself. It requires the network to identify all possible disjoint paths and disseminates the packets across all paths. This approach is well suited for a fully connected ad hoc wireless mesh network where the number of disjoint paths is more as compared to a sparse network where fewer disjoint paths are present. More ever this approach fails when subjected to false topology and denial of service in identifying disjoint paths. It is vulnerable to Rushing attacks and fails when there are many colluding attackers.SDT requires a security routing protocol [9]. Countermeasures for Network Layer The most variant DoS attacks occur in network layer. So, there are many solutions to secure this layer against DoS attacks. Detection and prevention mechanisms against various types of mentioned attacks are classified and described in the following. 3.2.1 Detect and Prevent Byzantine Attacks On Demand Secure Byzantine Routing (ODSBR) protocol is used to detect adversary nodes in a network and prevent Byzantine attacks. Inside attacks are difficult to detect since an authenticated node can either be hijacked by an attacker or a legitimate node may itself misuse network resources. The protocol uses reliability metric to identify faulty nodes and avoid them. It uses a secure probe technique embedded in the packets which is hidden from an adversary. Every link is associated with a metric which is used later by the secure route discovery protocol to avoid faulty links. This was implemented by operating the network in two states: probing state and non-probing state. The network initially operates in the non-probing state where it expects ACK only from the destination node. In the case of probing state it expects ACK from every intermediate node present in the path. The node enters into the non-probing state only when the fault rate goes above the fixed threshold value. The threshold value for packet loss rate, link timeout and sliding window size is set and is used to switch the network between these two 3.2.2 Detection and Prevention of Sybil Attack Sybil prevention techniques based on the connectivity characteristics of social graphs can also limit the extent of damage that can be caused by a given Sybil attacker while preserving anonymity, though these techniques cannot prevent Sybil attacks entirely, and may be vulnerable to widespread small-scale Sybil attacks. Examples of such prevention techniques are SybilGuard and the Advogato Trust Metric [5]. SybilGuard, a novel protocol for limiting the corruptive influences of sybil attacks, is based on the “social network” among user identities, where an edge between two identities indicates a human-established Table 2 : Countermeasures against Byzantine Attack in Network Layer Countermeasure Method Description ODSBR (On Demand Secure Byzantine Routing) Assumes bidirectional communication links and requires pair wise shared keys among the nodes which are established on demand. This approach is fast for sparse network. Watchdog and Path rater Detect adversarial nodes by monitoring the packet forwarding behaviors of the nodes in a neighborhood. Attack detection SDT (Secure Data Transmission) SDT is based on receiving ACK from the destination node. Helps us to detect the path in which an adversary node is present. Well suited for a fully connected ad hoc wireless mesh network where the number of disjoint paths is more. Advantages 5 Disadvantages 1- In the case of dense networks, the network takes time to identify the reliable link between the source and the destination. 2-Can get worse when the number of adversary nodes are more and are participating in many paths. 1-Suffers from many false positives when multi – rate or power control is used. 2-When two or more colluding adversary nodes are neighbors of each other, this method fails to detect the attack. 1-This approach fails when subjected to false topology and denial of service in identifying disjoint paths. 2-It is vulnerable to Rushing attacks and fails when there are many colluding attackers. trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionately-small “cut” in the graph between the Table 3 presents a summary of countermeasures against Sybil attack in network layer, advantages and disadvantages of them. Detection of Blackhole attacks EBAODV (Enhance Blackhole AODV) is a novel approach for detection of blackhole attacks in which leader nodes are used for detecting blackhole nodes. In this approach, leader nodes are created first. Leader nodes are used for detection of malicious nodes. From source node RREQ is generated. At that time one timer is used for measuring current time. We can assume any expired time (here 20ms). If RREP received before expired time then one fake packet will send to the destination, this packet is not original data packet. After that if acknowledgement (ACK) receives then original packet will send by source node. If ACK not receives it means packets are dropped. If no. of dropped packets are more than threshold value (here 10) then leader nodes will send block message to all its neighbors. Block message contains id of malicious node. All intermediate nodes receives table having black hole node. Now, again new RREQ message is generated for route discovery [14]. Another detection approach is an intelligent honeypot based system to detect blackhole attackers in WMNs. Prathapani et al. model the detection mechanism of malicious blackhole attackers using a honeypot as a detection agent [25]. A Honeypot is a security resource whose value lies in being probed, attacked or compromised. A honeypot is designed to interact with attackers to collect attack techniques and behaviors [26]. sybil nodes and the honest nodes. SybilGuard exploits this property to bound the number of identities a malicious user can create [24]. increments the ratings of nodes on all actively used paths by 0.01 at periodic intervals of 200ms [27, 28]. Byzantine - Resilent Secure Multicast Routing (BSMR) is secure multicast routing protocol that withstands insider attacks from colluding adversaries. BSMR ensures that multicast data is delivered from the source to the members of the multicast group, as long as the group members are reachable through nonadversarial paths and a non-adversarial path exists between a new member and a node in the multicast tree. This is done even in the presence of byzantine attackers. Outside attackers are prevented using authorization framework. Nodes have a method to determine the source authenticity of the received data. This allows a node to determine correctly the rate at which it receives multicast data. BSMR route discovery allows a newly added node to find a route to the multicast tree. The protocol follows the typical route request/route reply procedure used by on-demand routing protocols. All route discovery messages are authenticated using the public key corresponding to the network certificate to prevent the outside interferences. Only group authenticated nodes can initiate route requests. The group certificate is required in each request. Tree token are used to prove their current tree status [27, 29]. A summary of countermeasures against Grayhole attack in network layer, advantages and disadvantages of them has been listed in table 4. Channel Aware Detection (CAD) approach is implemented to mitigate routing protocol threats and route disruption attacks by limiting the number of packets forwarded to the malicious mesh devices. It is based on two strategies, the channel based estimation and traffic monitoring. If the monitored loss rate at particular hops exceeds the estimated normal loss rate, those nodes identified will be considered as malicious. The essence of CAD is to identify intentional dropping from normal channel losses. A normal packet loss can occur due to bad channel quality or medium access collision under the infinite buffer assumption. In CAD, each mesh node maintains a history of packet count to measure the link loss rate. When a node receives a packet from the upstream, it updates the packet count history with the corresponding packet sequence number [30]. 3.2.3 Detection and Prevention of Grayhole attack Watchdog and Pathrater are techniques for detecting and mitigating routing misbehavior. Watchdog is a method for detecting the misbehavior nodes. The pathrater is run by each node in the network. It combines knowledge of misbehaving nodes with link reliability data to find a reliable path. Each node maintains a rating for every other node it knows about in the network. The pathrater assigns ratings to nodes. When a node in the network becomes known to the pathrater (through route discovery), 0.5 is assigned by the pathrater. A node always rates itself with a 1.0. This ensures that when calculating the path, the pathrater Table 3: Countermeasures Against Sybil Attack in Network Layer Countermeasure Method Scheme Description Advantages Sybil Guard Prevention Limits the corruptive influence of Sybil attacks, including Sybil attacks exploiting IP harvesting and even some Sybil attacks launched from both nets outside the system. Advogato Prevention Disadvantages Vulnerable to widespread small-scale Sybil attacks. Vulnerable to widespread small-scale Sybil attacks. 6 Table 4: Countermeasures Against Grayhole Attack in Network Layer Countermeasure Method Description Advantages Disadvantages Watchdog and Pathrater Technique A technique for detecting and mitigating routing misbehavior. Detect misbehavior at the forwarding level. Do not detect a misbehaving node in the presence of ambiguous collisions, receiver collisions, limited transmission power, false misbehavior, collusion and partial dropping. BSMR Ensures that multicast data is delivered from the source to the members of the multicast group. Identifies and avoids adversarial links based on a reliability metric Assumes static detection threshold independent of channel quality and medium access collision It identifies intentional selective dropping from natural wireless losses. 1-Detection of attacker node does not depend on the data traffic through a node and CAD works well under dynamic channel behavior. 2-Efficient detection of attackers and improved packet delivery ratio. 1-Needs to send extra packet to initiate the detection. 2-It is difficult to detect the attacks, when noise is introduced into the channel. CAD Algorithm threshold value, it uses probing state of the network to detect faulty paths and avoid such faulty paths in the next route discovery. This is the only method that can detect even super Wormhole attacks. The disadvantage of this method is that it becomes very slow to detect the faulty links when the number of colluding nodes in the network increases [9]. Table 5 presents a summary of countermeasures against Wormhole attack in network layer, advantages and disadvantages of them. Rakesh Matamand and Somanath Tripathy proposes WRSR (wormhole-resistant secure routing), a wormhole-resistant secure routing algorithm that detects the presence of wormhole during route discovery process and quarantines it WRSR identifies route requests traversing a wormhole and prevents such routes from being established. WRSR uses unit disk graph model to determine the necessary and sufficient condition for identifying a wormhole-free path. The most attractive features of the WRSR include its ability to defend against all forms of wormhole (hidden and Byzantine) attacks without relying on any extra hardware like global positioning system, synchronized clocks or timing information, and computational intensive traditional cryptographic mechanisms [34]. 3.2.4 Detection and Prevention of Wormhole attack RRT based detection is one way proposed to measure the value of RRT between the node and its neighbors to validate the RTT value. If it exceeds the threshold value then it is suspected to be a malicious node. This method suffered from exposed attacks [9, 31]. Little Worp Protocol that is used in static networks to get the entire network topology based on two hop routing principle is used to detect malicious nodes and also to probe the neighbors behavior's to check if they are functioning in the right way [9, 32]. The Certificate based scheme is a scheme that defends against wormhole attacks which uses the secured extension of Ad-Hoc routing protocol that follows the method of issuing certificates by each node to each other nodes that are within its range and also monitors other nodes for RTT delay. It classifies the nodes that it can certify as trusty or untrustworthy based on the RTT value, depending on this it updates to certify or decertify the nodes. This method can also suffer from the drawbacks of an attacker who maliciously impersonates another node by compromising Public key [9]. Directional Antenna strategy has proposed the usage of antennas in ad-hoc and sensor networks to determine the distance with its neighbor based on the signal strength. This approach checks if the link actually exists by measuring the angle of the arrived information with the possible signal strength. The node verifies if it has a link within its region, if it does not fall within the verifiable region, the node simply rejects the link. This information is sent to a central controller to determine the network topology [9, 33]. ODSBR doesn't detect worm hole rather prevents the selection of the path that contains worm hole. It allows the network initially to work in the non – probing state where the optimal wormhole path would be selected and the path is monitored for packet loss. Once the packet loss rate or delay jitter increases the 3.3 Countermeasures for Transport Layer Secure socket layer (SSL), transport layer security (TLS) protocols and extensible authentication protocol encapsulating transport layer security (EAP-TLS) protocol are usually used for securing the transport layer in wireless networks including the WMNs against Syn flooding attack. SSL/TLS uses asymmetric key cryptographic techniques to ensure secure communication sessions. It can also help in protecting against masquerading attack, man-in-the middle attack, rollback attack, replay attack and buffer overflow attack. For securing the transport layer in WMNs, an upper layer authentication protocol (EAP-TLS) is proposed by Aboba and Simon. Although EAP-TLS offers mutual authentication between a mesh router 7 Table 5: Countermeasures Against Wormhole Attack in Network Layer Countermeasure Method Description Advantages Watchdog And Pathrater Technique A technique for detecting and mitigating routing misbehavior. Detect misbehavior at the forwarding level. BSMR BSMR ensures that multicast data is delivered from the source to the members of the multicast group. Identifies and avoids adversarial links based on a reliability metric It identifies intentional selective dropping from natural wireless losses. 1-Detection of attacker node does not depend on the data traffic through a node and CAD works well under dynamic channel behavior because threshold values are dynamic. 2-Efficient detection of attackers and improved packet delivery ratio. CAD Algorithm RRT based detection Little Worp protocol Measure the value of RRT between the node and its neighbors to validate the RTT value. Detect malicious nodes and also to probe the neighbors’ behaviors to check if they are functioning in the right way. Certificate based scheme It classifies the nodes that it can certify as trusty or untrustworthy based on the RTT value. Directional Antenna Checks if the link actually exists by measuring the angle of the arrived information with the possible signal strength. ODSBR Detecting malicious links based on end-to-end acknowledgment-based feedback technique. WRSR (wormholeresistant secure routing) Detects the presence of wormhole during route discovery process and quarantines it. Do not detect a misbehaving node in the presence of ambiguous collisions, receiver collisions, limited transmission power, false misbehavior, collusion and partial dropping. Assumes static detection threshold independent of channel quality and medium access collision 1-Needs to send extra packet to initiate the detection. Attack detection is done by the source router so attacker is identified only if the source router demands. 2-It is difficult to detect the attacks, when noise is introduced into the channel. This method suffered from exposed attacks. This method can also suffer from the drawbacks of an attacker who maliciously impersonates another node by compromising Public key. This is the only method that can detect even super Wormhole attacks. (MR) and a mesh client (MC) or between a pair of MCs, it introduces high latency in WMNs because each terminal acts as an authenticator for its previous neighbor before the authentication request reaches an authentication server (AS). Furthermore, for nodes with high mobility, frequent re-authentications due to handoffs can have a very adverse impact on the quality of service of the applications. As a result, variants of EAP-TLS have been proposed to adapt IEEE 802.1X authentication model for multi-hop WMNs. 4 Disadvantages It becomes very slow to detect the faulty links when the number of colluding nodes in the network increases. networking, community and neighborhood networks, delivering video, building automation in entertainment and sporting venues, etc. Despite its advantages it suffers from critical security issues that are of major concern while deploying WMN. Since WMNs are used for various applications, security is a serious concern to be addressed. In this paper we surveyed all kinds of DoS attack in WMNs. DoS attack may occur in each layer of network. So this paper classified all of them and gave an introduction about attacks. For each attack, there is some preventing, detecting or mitigating method to secure the network. We discussed about this methods, advantages and disadvantages of them. For next work, we will study Distributed Denial of Service (DDoS) attacks on WMNs and discuss about countermeasures against them. As a conclusion, all kind of DoS attacks in WMN and defense mechanisms against them has been listed in table 6. Conclusion Self-organization and self-configuration are the desired features of WMN. These features provide many advantages like good reliability, market coverage, scalability and low upfront cost. They also gained significant attention because of the numerous applications they support, for example, broadband home 8 Table 6: DoS Attacks and Defense Mechanisms in WMN Layer Attack Defense Mechanism Physical Jamming Spread spectrum, Multipath source routing protocol, Replication of control information, Counter data selective jamming attacks, WEP, DES,AES, CAD Byzantin ODSBR, Watchdog and Path rater , SDT Sybil SybilGuard, Advogato, SYIBSEC Rushing RAP, ODSBR, ARAN, SAR, SEAD, ARIADNE, SAODV, SRP, SEAODV Black hole Detection using Honey pots Gray hole Watchdog And Path rater Technique, BSMR, CAD Worm hole RRT based detection, Little Worp protocol, Certificate based scheme, Directional Antenna, ODSBR, WRSR Network 5 References 1. 2. monika, Denial of service attacks in wireless mESH NETWORK. IJCTIS, 2012. 3(3): p. 7. Akyildiz, I.F., X. Wang, and W. Wang, Wireless mesh networks: a survey. Computer networks, 2005. 47(4): p. 445-487. 3. Misra, S., et al., An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks. Computers & Mathematics with Applications, 2010. 60(2): p. 294-306. 4. Bicakci, K. and B. Tavli, Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Computer Standards & Interfaces, 2009. 31(5): p. 931-941. 5. al., M.M.C.e., Survey on various forms of attacks and countermeasures in wireless mesh network. IJAIR, 2013. 2(3). 6. Soomro, S.A., et al., Denial of Service Attacks in Wireless Ad hoc Networks. Journal of Information & Communication Technology, 2010. 4(2): p. 10. 7. Sen, J., Security and privacy issues in wireless mesh networks: A survey, in Wireless Networks and Security2013, Springer. p. 189-272. 8. Vaghela, M.M.D. and K.H. Wandra, Detection and Prevention Denial of Service Attacks in Wireless Mesh Networks. 2014. 9. Mohan, D., Denial of Service attack in Wireless Mesh Networks. 10. Pintea, C.-M. and P.C. Pop. Sensitive ants for denial jamming attack on wireless sensor network. in International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. 2014. Springer. 11. Aggarwal, N. and K. Dhankhar, Attacks on Mobile Adhoc Networks: A Survey. International Journal of Research in Advent Technology, 2014. 2(5): p. 307-316. 12. Prasoon, P., Security Frame Work against Denial of Service Attacks in Wireless Mesh Networks, 2011, National Institute of Technology Rourkela. 13. Gankotiya, A.K., S. Seth, and G. Singh, Attacks and their Counter Measures in Wireless Mesh Networks. Cyber Security Research Center, 2010. 14. Rachh, A.V., Y.V. Shukla, and T.R. Rohit, A Novel Approach for Detection of Blackhole Attacks. 2014. 15. V, V.V. and V.M.A. Rajam, Detection of Colluding Selective Forwarding Nodes in Wireless Mesh Networks Based on Channel Aware Detection Algorithm. MES Journal of Technology and Management: p. 5. 16. Wang, H., D. Zhang, and K.G. Shin. Detecting SYN flooding attacks. in INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. 2002. IEEE. 17. Sgora, A., D.D. Vergados, and P. Chatzimisios, A survey on security and privacy issues in wireless mesh networks. Security and Communication Networks, 2013. 18. Sen, J., Secure routing in wireless mesh networks. arXiv preprint arXiv:1102.1226, 2011. 19. Di Pietro, R., et al., Security in Wireless Ad-Hoc Networks–A Survey. Computer Communications, 2014. 20. Xu, W., et al., Jamming sensor networks: attack and defense strategies. Network, IEEE, 2006. 20(3): p. 41-47. 21. Gummadi, R., et al., Understanding and mitigating the impact of RF interference on 802.11 networks. ACM SIGCOMM Computer Communication Review, 2007. 37(4): p. 385-396. 22. Lazos, L. and M. Krunz, Selective jamming/dropping insider attacks in wireless mesh networks. IEEE network, 2011. 25(1): p. 30-34. 23. Kumar, M.V. and M. Tech, Blocking Selective Jamming Attacks. 24. Yu, H., et al. Sybilguard: defending against sybil attacks via social networks. in ACM SIGCOMM Computer Communication Review. 2006. ACM. 9 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. Prathapani, A., L. Santhanam, and D.P. Agrawal, Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. The Journal of Supercomputing, 2013. 64(3): p. 777-804. Gupta, P., et al., Securing WMN using Honeypot Technique. International Journal on Computer Science and Engineering, 2012. 4(2). Thomas, C. and D.S. Pankaj, Performance Evaluation of Various Contermeasures for Grayhole Attack in Wireless Mesh Network. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 2013. 2(4). Marti, S., et al. Mitigating routing misbehavior in mobile ad hoc networks. in Proceedings of the 6th annual international conference on Mobile computing and networking. 2000. ACM. Curtmola, R. and C. Nita-Rotaru, BSMR: byzantine-resilient secure multicast routing in multihop wireless networks. Mobile Computing, IEEE Transactions on, 2009. 8(4): p. 445-459. Bhide, A., M.A.S. DR, and S. Arshad, Channel Aware Detection based Network Layer Security in Wireless Mesh Networks. International Journal of Advanced Engineering and Global Technology, 2014. 2(5). Zhen, J. and S. Srinivas, Preventing replay attacks for secure routing in ad hoc networks, in Ad-Hoc, Mobile, and Wireless Networks2003, Springer. p. 140-150. Khalil, I., S. Bagchi, and N.B. Shroff. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on. 2005. IEEE. Wang, W. and B. Bhargava. Visualization of wormholes in sensor networks. in Proceedings of the 3rd ACM workshop on Wireless security. 2004. ACM. Matam, R. and S. Tripathy, WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP Journal on Wireless Communications and Networking, 2013. 2013(1): p. 1-12. 10