Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism

被引:18
作者
Kuo, Shu-Yu [1 ,2 ,3 ,4 ]
Tseng, Fan-Hsun [5 ]
Chou, Yao-Hsin [6 ,7 ]
机构
[1] Natl Taiwan Univ, Ctr Quantum Sci & Engn, IBM Quantum Hub, Taipei 10617, Taiwan
[2] Natl Taiwan Univ, Dept Phys, Taipei 10617, Taiwan
[3] Natl Taiwan Univ, Ctr Theoret Phys, Taipei 10617, Taiwan
[4] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 40227, Taiwan
[5] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701401, Taiwan
[6] Natl Chi Nan Univ, Dept Comp Sci & Informat Engn, Puli 54561, Taiwan
[7] Natl Ctr Theoret Sci, Phys Div, Taipei 10617, Taiwan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2023年 / 143卷
关键词
IoT security; Network security; Malware analysis; Wormhole attacks; Intrusion detection; Probability ratio test; Mobile cloud security; Security for Metaverse; Virtualization security; Cyber -Physical security; AD-HOC NETWORKS; WIRELESS;
D O I
10.1016/j.future.2023.01.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Metaverse shows great potential to facilitate the development of new technologies. Because the security of the Metaverse has attracted considerable attention, the automatic detection of malware in different scenarios related to the Metaverse has become significant as well. A Metaverse-based wireless system comprises various physical and virtual sensing models, and the security between these sensors and nodes should be further considered. A wormhole link is created by two malicious radio transceivers connected by high capacity out-of-band wireless or wired links. Wormhole attacks can easily subvert many network protocols and maliciously collect a large amount of traffic. As many new mobile applications in the Internet of Things (IoT) have emerged recently, the threat posed by wormhole attacks has increased. Accordingly, research efforts have been made to develop countermeasures for wormhole attacks. However, most of them have considered a static network, assuming that a wormhole does not move and that wormhole nodes cannot adaptively turn their radio on or off to avoid being detected. These assumptions limit the use of existing detection methods. Hence, we first study the security impact and characteristics of wormhole attacks in mobile cloud and Metaverse environments and find the possibility of matching statistical methods such as the sequential probability ratio test (SPRT) to detect wormholes. Moreover, in our assumed topology, nodes in the network have mobility. From our investigation results, we attempt to derive a novel defense mechanism design against wormhole attacks.(c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页码:179 / 190
页数:12
相关论文
共 46 条
  • [1] [Anonymous], 2004, ACM INT C MOBILE COM
  • [2] Local Connectivity Tests to Identify Wormholes in Wireless Networks
    Ban, Xiaomeng
    Sarkar, Rik
    Gao, Jie
    [J]. PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC' 11), 2011,
  • [3] Unit disk graph recognition is NP-hard
    Breu, H
    Kirkpatrick, DG
    [J]. COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS, 1998, 9 (1-2): : 3 - 24
  • [4] Buttyán L, 2005, LECT NOTES COMPUT SC, V3813, P128
  • [5] Camp T., 2002, WIREL COMMUN MOB COM, V2, P483
  • [6] Capkun S., 2003, P 1 ACM WORKSH SEC A
  • [7] Capkun S., 2003, 17 ANN INT C MOBILE
  • [8] de Graaf R, 2010, L N INST COMP SCI SO, V28, P208
  • [9] Energy-Efficient Reprogramming of a Swarm of Mobile Sensors
    De, Pradip
    Liu, Yonghe
    Das, Sajal K.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (05) : 703 - 718
  • [10] Defense Advanced Research Projects Agency, FREQUENTLY ASKED QUE