Hindawi Publishing Corporation
EURASIP Journal on Wireless Communications and Networking
Volume 2009, Article ID 945943, 13 pages
doi:10.1155/2009/945943
Research Article
Mobility and Cooperation to
Thwart Node Capture Attacks in MANETs
Mauro Conti,
1
Roberto Di Pietro,
2, 3
Luigi V. Mancini,
4
and Alessandro Mei
4
1
Department of Computer Science, Vrije Universiteit Amsterdam, 1081 HV Amsterdam, The Netherlands
2
UNESCO Chair in Data Privacy, Universitat Rovira i Virgili, 43700 Tarragona, Spain
3
Dipartimento di Matematica, Universit` a di Roma Tre, 00146 Roma, Italy
4
Dipartimento di Informatica, Universit` a di Roma “Sapienza”, 00198 Roma, Italy
Correspondence should be addressed to Mauro Conti, conti@di.uniroma1.it
Received 22 February 2009; Revised 13 June 2009; Accepted 22 July 2009
Recommended by Hui Chen
The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security
issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture
a node from the network eventually acquiring all the cryptographic material stored in it. Further, the captured node can be
reprogrammed by the adversary and redeployed in the network in order to perform malicious activities. In this paper, we address
the node capture attack in MANETs. We start from the intuition that mobility, in conjunction with a reduced amount of local
cooperation, helps computing effectively and with a limited resource usage network global security properties. Then, we develop
this intuition and use it to design a mechanism to detect the node capture attack. We support our proposal with a wide set
of experiments showing that mobile networks can leverage mobility to compute global security properties, like node capture
detection, with a small overhead.
Copyright © 2009 Mauro Conti et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Ad hoc network can be deployed in harsh environments to
fulfil law enforcement, search-and-rescue, disaster recovery,
and other civil applications. Due to their nature, ad hoc
networks are often unattended, hence prone to different
kinds of novel attacks. For instance, an adversary could
eavesdrop all the network communications. Further, the
adversary might capture (i.e., remove) nodes from the
network. These captured nodes can then be reprogrammed
and deployed within the network area, for instance, to
subvert the data aggregation or the decision making process
in the network [1]. Also, the adversary could perform a
sybil attack [2], where a single node illegitimately claims
multiple identities also stolen from previously captured
nodes. Another type of attack is the clone attack, where the
node is first captured, then tampered with, reprogrammed,
and finally replicated in the network. The former attack can
be efficiently addressed with mechanism based on RSSI [3]
or with authentication based on the knowledge of a fixed key
set [4], while recent solutions have been proposed also for the
detection of the clone attack [5, 6].
To think of a foreseeable application for node capture
detection, note that recently the US Defense Advanced
Research Projects Agency (DARPA) initiated a new research
program to develop so-called LANdroids [7]: Smart robotic
radio relay nodes for battlefield deployment. LANdroid
mobile nodes are supposed to be deployed in hostile
environment, establish an ad-hoc network, and provide
connectivity as well as valuable information for soldiers that
would later approach the deployment area. LANdroids might
retain valuable information for a long time, until soldiers
move close to the network. In the interim, the adversary
might attempt to capture one of these nodes. We are not
interested in the goals of the capture (that could be, e.g.,
to reprogram the node to infiltrate the network, or simply
extracting the information stored in it); but on the open
problem of how to detect the node capture that represents,
as shown by the above-cited examples, a possible first step to
jeopardize an ad hoc network. Indeed, an adversary has often