Stealth attacks on ad-hoc wireless networks

被引:5
作者
Jakobsson, M [1 ]
Wetzel, S [1 ]
Yener, B [1 ]
机构
[1] RSA Labs, Bedford, MA 01730 USA
来源
2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS | 2003年
关键词
D O I
10.1109/VETECF.2003.1285396
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hijack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are "stealth attacks" in that they minimize the cost to and visibility of the attacker. We introduce the notion of reputation based control, and suggest that it can be used to augment existing routing protocols in order to immunize these against stealth attacks.
引用
收藏
页码:2103 / 2111
页数:9
相关论文
共 19 条
[1]  
[Anonymous], DYNAMIC SOURCE ROUTI
[2]  
[Anonymous], 1999, IEEE 2 WORKSH MOB CO
[3]  
[Anonymous], 1997, P IEEE INFOCOM
[4]  
FEENY LM, 2001, P IEEE INFOCOM
[5]  
Gafni E., 1981, IEEE T COMMUNICATION
[6]  
HASS ZJ, 2001, IEEE ACM T NETWORKIN
[7]  
HU YC, 2003, P IEEE INFOCOM
[8]  
HU YC, 2000, P ACM MOB
[9]  
*INT SEC APPL AUTH, 2001, SEC WEP ALG
[10]  
JAKOBSSON M, 2003, UNTRACEABLE EMAIL CL