An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks

被引:1
|
作者
Alajeely, Majeed [1 ]
Ahmad, Asma'a [1 ]
Doss, Robin [1 ]
Mak-Hau, Vicky [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic, Australia
来源
FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015 | 2015年 / 523卷
关键词
Opportunistic networks; Security; Packet dropping attacks; Denial-of-service; Malicious node detection;
D O I
10.1007/978-3-319-19210-9_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In our previous novel attack (Packet Faking Attack [1]) we presented a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. In this paper, we present an efficient detection mechanism against this type of attack where each node can detect the attack instead of the destination node. Our detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea, that is, the packet creation time of each packet. Simulation results show this robust mechanism achieves a very high accuracy, detection rate and good network traffic reduction.
引用
收藏
页码:84 / 100
页数:17
相关论文
共 50 条
  • [31] Energy Efficient Forwarding Algorithm in Opportunistic Networks
    ZHANG Feng
    WANG Xiaoming
    JIANG Liping
    ZHANG Lichen
    ChineseJournalofElectronics, 2016, 25 (05) : 957 - 964
  • [32] Packet Storage Time Attack - A Novel Routing Attack in Mobile Ad hoc Networks
    Jim, Lincy Elizebeth
    Gregory, Mark A.
    2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2016, : 127 - 132
  • [33] Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
    Pundir, Sumit
    Wazid, Mohammad
    Singh, Devesh Pratap
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    Park, Youngho
    SENSORS, 2020, 20 (05)
  • [34] Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink
    Guerroumi, Mohamed
    Derhab, Abdelouahid
    Saleem, Kashif
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 307 - 313
  • [35] An Overlapping Community Detection Algorithm for Opportunistic Networks
    Ma, Xuebin
    Ouyang, Zhenchao
    Bai, Lin
    Zhan, Xin
    Bai, Xiangyu
    2014 IEEE COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP), 2014, : 110 - 115
  • [36] Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks
    Dhama, Siddharth
    Sharma, Sandeep
    Saini, Mukul
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2993 - 2996
  • [37] Trust-Based Security Protocol Against Blackhole Attacks in Opportunistic Networks
    Gupta, Sahil
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Kumar, Arun
    Obaidat, Mohammed S.
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 724 - 729
  • [38] Identifying influential nodes for efficient routing in opportunistic networks
    Gao, Zhenxiang
    Shi, Yan
    Chen, Shanzhi
    Journal of Communications, 2015, 10 (01): : 48 - 54
  • [39] An Effective Mechanism against Intrusion Attack using Aggregate Traffic Prediction for Wireless Industrial Networks
    Wei, Min
    Kim, Keecheon
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4457 - 4462
  • [40] Packet Injection Exploiting Attack and Mitigation in Software-Defined Networks
    Li, Jishuai
    Qin, Sujuan
    Tu, Tengfei
    Zhang, Hua
    Li, Yongsheng
    APPLIED SCIENCES-BASEL, 2022, 12 (03):