Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets

被引:8
作者
Alajeely, Majeed [1 ]
Ahmad, Asma'a [1 ]
Doss, Robin [1 ]
Mak-Hau, Vicky [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic, Australia
来源
2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS) | 2014年
关键词
Opportunistic Networks; Security; Packet Dropping Attacks; Denial-of-Service; Malicious Node Detection;
D O I
10.1109/CIS.2014.15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is a major challenge in Opportunistic Networks (OppNets) due to its characteristics of being an open medium with dynamic topology, there is neither a centralized management nor clear lines of defence. A packet dropping attack is one of the major security threats in OppNets as neither source nodes nor destination nodes have any knowledge of when or where a packet will be dropped. In this paper, we present a novel attack and detection mechanism against a special type of packet dropping where the malicious node drops one packet or more and injects a new fake packet instead. Our novel detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea; the creation time of each packet. Significant results show this robust mechanism achieves a very high accuracy and detection rate.
引用
收藏
页码:638 / 642
页数:5
相关论文
共 50 条
[21]   A Novel Detection and Localization Scheme of Wormhole Attack in IoT Network [J].
Chen, Cheng ;
Tong, Fei ;
Zhang, Yujian ;
Zhu, Ziyan .
2022 13TH ASIAN CONTROL CONFERENCE, ASCC, 2022, :1983-1988
[22]   A NOVEL SYBIL ATTACK DETECTION SCHEME FOR WIRELESS SENSOR NETWORK [J].
Tian, Bin ;
Yao, Yizhan ;
Shi, Lei ;
Shao, Shuai ;
Liu, Zhaohui ;
Xu, Changxing .
2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, :294-297
[23]   DDoS Attack Detection Mechanism in the Application Layer Using User Features [J].
Bravo, Silvia ;
Mauricio, David .
CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2018, :97-100
[24]   Sinkhole attack detection and avoidance mechanism for RPL in wireless sensor networks [J].
Jamil A. ;
Ali M.Q. ;
Abd Alkhalec M.E. .
Annals of Emerging Technologies in Computing, 2021, 5 (Special issue 5) :94-101
[25]   A detection design for distributed denial of service attack [J].
Fujita, N .
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, :78-82
[26]   NOVEL PRESENTATION ATTACK DETECTION ALGORITHM FOR FACE RECOGNITION SYSTEM: APPLICATION TO 3D FACE MASK ATTACK [J].
Raghavendra, R. ;
Busch, Christoph .
2014 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2014, :323-327
[27]   Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack [J].
Deepika Kukreja ;
S. K. Dhurandher ;
B. V. R. Reddy .
Journal of Ambient Intelligence and Humanized Computing, 2018, 9 :941-956
[28]   Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks [J].
Kshirsagar, Vishvas Haridas ;
Kanthe, Ashok M. ;
Simunic, Dina .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (02) :311-320
[29]   Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks [J].
Vishvas Haridas Kshirsagar ;
Ashok M. Kanthe ;
Dina Simunic .
Wireless Personal Communications, 2018, 100 :311-320
[30]   Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack [J].
Kukreja, Deepika ;
Dhurandher, S. K. ;
Reddy, B. V. R. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) :941-956