To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks

被引:29
作者
Li, Qinghua [1 ]
Gao, Wei [2 ]
Zhu, Sencun [3 ]
Cao, Guohong [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, IST Bldg, University Pk, PA 16802 USA
[2] Univ Tennessee, Dept Elect Engn & Comp Sci, Knoxville, TN 37996 USA
[3] Penn State Univ, Dept Comp Sci & Engn, Coll Informat Sci & Technol, University Pk, PA 16802 USA
关键词
DTN; security; flood attack; detection;
D O I
10.1109/TDSC.2012.84
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood attacks in which attackers send as many packets or packet replicas as possible to the network, in order to deplete or overuse the limited network resources. In this paper, we employ rate limiting to defend against flood attacks in DTNs, such that each node has a limit over the number of packets that it can generate in each time interval and a limit over the number of replicas that it can generate for each packet. We propose a distributed scheme to detect if a node has violated its rate limits. To address the challenge that it is difficult to count all the packets or replicas sent by a node due to lack of communication infrastructure, our detection adopts claim-carry-and-check: each node itself counts the number of packets or replicas that it has sent and claims the count to other nodes; the receiving nodes carry the claims when they move, and cross-check if their carried claims are inconsistent when they contact. The claim structure uses the pigeonhole principle to guarantee that an attacker will make inconsistent claims which may lead to detection. We provide rigorous analysis on the probability of detection, and evaluate the effectiveness and efficiency of our scheme with extensive trace-driven simulations.
引用
收藏
页码:168 / 182
页数:15
相关论文
共 39 条
[1]  
[Anonymous], P ACM SIGCOMM
[2]  
[Anonymous], P IEEE S SEC PRIV
[3]  
[Anonymous], CS200006 DUK U
[4]  
[Anonymous], 2006, P IEEE INFOCOM
[5]  
Burgess J., 2007, P ACM MOBIHOC
[6]  
Chaintreau A., 2007, P ACM CONEXT C
[7]  
Chen BB, 2010, IEEE INFOCOM SER
[8]  
Daly E, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P32
[9]   Reality mining: sensing complex social systems [J].
Eagle, Nathan ;
Pentland, Alex .
PERSONAL AND UBIQUITOUS COMPUTING, 2006, 10 (04) :255-268
[10]  
F-SECURE, 2012, F SEC MALW INF PAG S