4 Discussion and Conclusion
We have shown that current proposals for QoS signaling in MANETs are highly suscep-
tible to a number of powerful attacks, even when a secure routing protocol is in place.
Our investigations suggest that a complete solution to secure QoS signaling solution for
MANET should incorporate the following elements: (1) intelligent traffic management,
(2) lightweight intrusion detection, and (3) efficient cryptographic primitives.
As discussed, a large class of QoS-based attacks in MANETs can be mitigated via
distributed traffic management (cf. [6]). However, some attacks are difficult to mitigate
without some means of identifying which nodes have been compromised. Conventional
intrusion detection systems are generally impractical for MANETs (cf. [9], [10]), but
distributed trust establishment schemes (cf. [11]) could provide sufficient information
for nodes to avoid certain types of QoS signaling attacks. While we have not focused on
the application of cryptographic primitives to QoS signaling, some form of lightweight
scheme is necessary to authenticate the signaling control information.
In ongoing work, we are further developing the DRQoS scheme presented in [6]. We
are also investigating computationally lightweight schemes to establish trust measures
for MANETs that could be used to make QoS signaling more secure. Our ultimate aim
is to design a flexible and secure QoS signaling protocol that can successfully resist
attacks which exploit the inherent vulnerabilities of MANETs.
References
1. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. In: IEEE Network Special Issue on Net-
work Security. Vol. 13. (1999) 24–30
2. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On Demand Routing Protocol for Ad
hoc Networks. In: Proc. ACM MobiCom ’02. (2002) 12–23
3. Lee, S.B., Ahn, G., Zhang, X., Campbell, A.T.: INSIGNIA: An IP Based Quality of Service
Framework for Mobile Ad Hoc Networks, In: Journal of Parallel and Distributed Computing.
Vol. 60. (2000) 374–406
4. Veres, A., Campbell, A.T., Barry, M., Sun, L.H.: Supporting Service Differentiation in Wire-
less Packet Networks Using Distributed Control (SWAN). In: IEEE Journal on Selected Ar-
eas in Communications. Vol. 19, (2001) 2094-2104
5. Yeh, C.H., Mouftah, H.T., Hassanein, H.: Signaling and QoS Guarantees in Mobile Ad hoc
Networks. In: Proc. IEEE ICC. (2002) 3284-3290
6. Hejmo, M., Mark, B.L., Zouridaki, C., Thomas, R.K.: Denial-of-Service Resistant Quality-
of-Service Signaling Protocol for Mobile Ad hoc Networks. In: Proc. ACM SASN Work-
shop. (2004) 23-28
7. Haas, Z.J., Deng, J.: Dual Busy Tone Multiple Access (DBTMA): A Multiple Access Control
Scheme for Ad Hoc Networks. In: IEEE Trans. on Comm. Vol. 50. (2002) 975–985
8. Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attacks and Defense Mechanisms. In: ACM
SIGCOMM Computer Communications Review. Vol. 34, (2004) 39-54
9. Huang, Y.A., Lee, W.: A Cooperative Intrusion Detection System for Ad hoc Networks. In:
Proc. ACM SASN Workshop. (2003) 135–147
10. Tseng C.Y. et al: A Specification-Based Intrusion Detection System for AODV. In: Proc.
ACM SASN Workshop (2003) 125-134
11. Eschenauer, L., Gligor, V.D., Baras, J.: On Trust Establishment in Mobile Ad-hoc Networks.
In: Proc. Security Protocols Workshop. Vol. 2845 (2002) 47-66
70