Security for Multihop Wireless Networks OTHER COMMUNICATIONS BOOKS FROM AUERBACH Advances in Biometrics for Secure Human Image Encryption: A Communication Perspective Authentication and Recognition Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Edited by Dakshina Ranjan Kisku, Phalguni Gupta, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, and Jamuna Kanta Sing El-Sayed M. El-Rabaie, and Saleh A. Alshebeili ISBN 978-1-4665-8242-2 ISBN 978-1-4665-7698-8 Intrusion Detection in Wireless Ad-Hoc Networks Anonymous Communication Networks: Protecting Nabendu Chaki and Rituparna Chaki Privacy on the Web ISBN 978-1-4665-1565-9 Kun Peng ISBN 978-1-4398-8157-6 Intrusion Detection Networks: A Key to Collaborative Security Case Studies in Enterprise Systems, Complex Systems, Carol Fung and Raouf Boutaba and System of Systems Engineering ISBN 978-1-4665-6412-1 Edited by Alex Gorod, Brian E. White, Vernon Ireland, S. Jimmy Gandhi,and Brian Sauser MIMO Processing for 4G and Beyond: Fundamentals ISBN 978-1-4665-0239-0 and Evolution Edited by Mário Marques da Silva and Francisco A.T.B.N. Monteiro Cyber-Physical Systems: Integrated Computing and ISBN 978-1-4665-9807-2 Engineering Design Modeling and Analysis of P2P Content Distribution Fei Hu Systems ISBN 978-1-4665-7700-8 Yipeng Zhou and Dah Ming Chiu Evolutionary Dynamics of Complex Communications ISBN 978-1-4822-1920-3 Networks Network Innovation through OpenFlow and SDN: Vasileios Karyotis, Eleni Stai, and Symeon Papavassiliou Principles and Design ISBN 978-1-4665-1840-7 Edited by Fei Hu ISBN 978-1-4665-7209-6 Extending the Internet of Things: Towards a Global and Seemless Integration Pervasive Computing: Concepts, Technologies and Antonio J. Jara-Valera Applications ISBN 9781466518483 Guo Minyi, Zhou Jingyu, Tang Feilong, and Shen Yao ISBN 978-1-4665-9627-6 Fading and Interference Mitigation in Wireless Communications Physical Layer Security in Wireless Communications Stefan Panic Edited by Xiangyun Zhou. Lingyang Song, and Yan Zhang ISBN 978-1-4665-0841-5 ISBN 978-1-4665-6700-9 The Future of Wireless Networks: Architectures, Security for Multihop Wireless Networks Protocols, and Services Shafiullah Khan and Jaime Lloret Mauri ISBN 978-1-4665-7803-6 Edited by Mohesen Guizani, Hsiao-Hwa Chen, and Chonggang Wang Self-Healing Systems and Wireless Networks Management ISBN 978-1-4822-2094-0 Junaid Ahsenali Chaudhry ISBN 978-1-4665-5648-5 Green Networking and Communications: ICT for Sustainability Unit and Ubiquitous Internet of Things Edited by Shafiullah Khan and Jaime Lloret Mauri Huansheng Ning ISBN 978-1-4665-6874-7 ISBN 978-1-4665-6166-3 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: [email protected] Security for Multihop Wireless Networks Shafiullah Khan and Jaime Lloret Mauri CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2014 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20140228 International Standard Book Number-13: 978-1-4665-7804-3 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro- vides licenses and registration for a variety of users. For organizations that have been granted a pho- tocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Preface ............................................................................................................ix Contributors ..................................................................................................xi SeCtion i SeCURitY in MoBiLe AD HoC netWoRKS 1 Taxonomy and Holistic Detection of Security Attacks in MANETs ......3 P. GARCÍA-TEODORO, L. SÁNCHEZ-CASADO, AND G. MACIÁ-FERNÁNDEZ 2 Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks ..............................................................................................19 MOHAMED AMINE FERRAG, MEHDI NAFA, AND SALIM GHANEMI 3 Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks .....................................................43 A. S. KHAN, N. FISAL, M. ESA, S. KAMILAH, SULEIMAN ZUBAIR, W. MAQBOOL, AND Z. ABU BAKAR 4 Fighting against Black Hole Attacks in Mobile Ad Hoc Networks ......73 MANUEL D. SERRAT-OLMOS, ENRIQUE HERNÁNDEZ-ORALLO, JUAN-CARLOS CANO, CARLOS T. CALAFATE, AND PIETRO MANZONI 5 Mutual Authentication in IP Mobility-Enabled Multihop Wireless Networks ..............................................................................101 SANAA TAHA, SANDRA CÉSPEDES, AND XUEMIN (SHERMAN) SHEN 6 Detection of Misbehaving Nodes in Vehicular Ad Hoc Network .......125 RAJESH P. BARNWAL AND SOUMYA K. GHOSH v vi ◾ Contents SeCtion ii SeCURitY in WiReLeSS SenSoR netWoRKS 7 Security Architecture for Multihop Wireless Sensor Networks .........157 ISMAIL MANSOUR, GERARD CHALHOUB, AND MICHEL MISSON 8 Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach........................................179 DAUDA AYANDA 9 TinyKey: A Pragmatic and Energy Efficient Security Layer for Wireless Sensor Networks .............................................................223 ROBERTO DORIGUZZI CORIN, GIOVANNI RUSSELLO, AND ELIO SALVADORI 10 Secure Multipurpose Wireless Sensor Networks ................................247 DANIEL JACOBI, MARC FISCHLIN, AND ALEJANDRO BUCHMANN 11 Anomaly Detection in Wireless Sensor Networks: Challenges and Future Trends ..............................................................................273 MUHAMMAD USMAN, VALLIPURAM MUTHUKKUMARASAMY, XIN-WEN WU, AND SURRAYA KHANUM 12 Taxonomy of Security Protocols for Wireless Sensor Communications ................................................................................305 JASONE ASTORGA, EDUARDO JACOB, NEREA TOLEDO, AND MARIVI HIGUERO SeCtion iii SeCURitY in otHeR AD HoC netWoRKS 13 Securing the Control of Euler–Lagrange Systems in Networked Environments with Model-Free Sliding Mode Control ......................353 SHUAI LI, YUNPENG WANG, AND LONG CHENG 14 Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc Networks ...............................................................................377 L. SÁNCHEZ-CASADO, R. MAGÁN-CARRIÓN, P. GARCÍA-TEODORO, AND J.E. DÍAZ-VERDEJO 15 Security Issues in Machine-to-Machine Communication ..................401 SHUO CHEN AND MAODE MA 16 Authentication in Wireless Mesh Networks .......................................419 AYMEN BOUDGUIGA AND MARYLINE LAURENT Contents ◾ vii 17 Wireless-Based Application-Layer Cross-Layer Design with Simultaneous Quality of Service and Security Support .............447 SASAN ADIBI 18 Security, Trust, and Privacy in Opportunistic Multihop Wireless Networks ..............................................................................477 M. BALA KRISHNA Index ...........................................................................................................503 Preface First of all, we would like to express our gratitude to the publisher Taylor & Francis for giving us full support in the timely completion of this book. We also thank all the authors for their chapter contributions to this book, including those whose manuscripts we were not able to include due to the rigorous review-based selection process. The authors of the accepted chapters come from many parts of the world, including Algeria, Australia, Canada, China, Colombia, France, Germany, India, Italy, Malaysia, New Zealand, Nigeria, Singapore, Spain, and the United States. It is well understood nowadays that wireless networks have become a part of our daily technical life. Though the impact of wireless networking was more or less assessed since the advent of basic wireless technologies, today’s vast and dynamic features of various wireless applications might not have been accurately envisaged. Today, the types of wireless networks range from cellular networks to ad hoc net- works, infrastructure-based networks to infrastructure-less networks, short-range networks to long-range direct communication wireless networks, static wireless networks to mobile networks, and so on. Hence, while initiating this book project, choosing a plain title seemed to be a challenge but it also allowed different topics on wireless security to be compiled in a single volume. This book is mainly targeted at researchers, postgraduate students in universi- ties, academics, and industry practitioners or professionals. Elementary informa- tion about wireless security is not a priority of this book. Hence, some chapters include detailed research works and results on wireless network security. The book provides a broad coverage of wireless security issues. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. Instead of simply including chapters like a regular textbook, we have mainly focused on research-based outcomes. Hence, while addressing all the relevant issues and works in various layers, we basically lined up the chapters from easy-to-read survey-type articles to detailed investigation-related works. Owing to the nature of research works, some of the concepts and future vision may not seem to be fully practical considering the state of the art. Still, to capture ix