Surviving Attacks on Disruption-Tolerant Networks without Authentication

被引:0
作者
Burgess, John [1 ]
Bissias, George Dean [1 ]
Corner, Mark [1 ]
Levine, Brian Neil [1 ]
机构
[1] BBN Technol, Cambridge, MA USA
来源
MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING | 2007年
关键词
DTN; deployment; mobility; routing; security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN may attempt to delay or destroy data in transit to its destination. Such attacks include dropping data, flooding the network with extra messages, corrupting routing tables, and counterfeiting network acknowledgments. Many existing methods for securing routing protocols require authentication supported by mechanisms such as a public key infrastructure, which is difficult to deploy and operate in a DTN, where connectivity is sporadic. Furthermore, the complexity of such mechanisms may dissuade node participation so strongly that potential attacker impacts are dwarfed by the loss of contributing participants. In this paper, we use connectivity traces from our UMass Diesel-Net project and the Haggle project to quantify routing attack effectiveness on a DTN that lacks security. We introduce plausible attackers and attack modalities and provide complexity results for the strongest of attackers. We show that the same routing with packet replication used to provide robustness in the face of unpredictable mobility allows the network to gracefully survive attacks. In the case of the most effective attack, acknowledgment counterfeiting, we show a straightforward defense that uses cryptographic hashes but not a central authority. We conclude that disruption-tolerant networks are extremely robust to attack; in our trace-driven evaluations, an attacker that has compromised 30% of all nodes reduces delivery, rates from 70% to 55%, and to 20% with knowledge of future events. By comparison, contemporaneously connected networks are significantly more fragile.
引用
收藏
页码:61 / 70
页数:10
相关论文
共 33 条
  • [1] [Anonymous], 2005, ACM SIGCOMM workshop on delay-tolerant networking
  • [2] [Anonymous], 2005, MOBIHOC
  • [3] [Anonymous], P 6 ANN INT C MOB CO
  • [4] [Anonymous], P WORKSH SERV ASS PA
  • [5] BALASUBRAMANIAN A, 2007, P ACM SIGCOMM AUG
  • [6] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [7] Buchegger S., 2003, P WIOPT MOD MOB AD H, P131
  • [8] Burgess J., 2006, P IEEE INFOCOM APR
  • [9] Burns B, 2005, IEEE INFOCOM SER, P398
  • [10] Mobility helps peer-to-peer security
    Capkun, S
    Hubaux, JP
    Buttyán, L
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (01) : 43 - 51