An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks

被引:1
|
作者
Alajeely, Majeed [1 ]
Ahmad, Asma'a [1 ]
Doss, Robin [1 ]
Mak-Hau, Vicky [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic, Australia
来源
FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015 | 2015年 / 523卷
关键词
Opportunistic networks; Security; Packet dropping attacks; Denial-of-service; Malicious node detection;
D O I
10.1007/978-3-319-19210-9_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In our previous novel attack (Packet Faking Attack [1]) we presented a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. In this paper, we present an efficient detection mechanism against this type of attack where each node can detect the attack instead of the destination node. Our detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea, that is, the packet creation time of each packet. Simulation results show this robust mechanism achieves a very high accuracy, detection rate and good network traffic reduction.
引用
收藏
页码:84 / 100
页数:17
相关论文
共 50 条
  • [41] Impersonation Attack Detection in IoT Networks
    Dinh Duc Nha Nguyen
    Sood, Keshav
    Xiang, Yong
    Gao, Longxiang
    Chi, Lianhua
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6061 - 6066
  • [42] Packet Injection Attack and Its Defense in Software-Defined Networks
    Deng, Shuhua
    Gao, Xing
    Lu, Zebin
    Gao, Xieping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 695 - 705
  • [43] Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack
    Alghamdi, Ahmed
    Arozullah, Mohammed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (04): : 8 - 18
  • [44] A Resource Reservation Attack Against LTE Networks
    Bassil, Ramzi
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 262 - 268
  • [45] Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA
    Kravchik, Moshe
    Shabtai, Asaf
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2179 - 2197
  • [46] Efficient Packet Routing in Highly Mobile Wireless Networks
    Cheoleun Moon
    Yusung Kim
    Dohyung Kim
    Hyunsoo Yoon
    Ikjun Yeom
    Wireless Personal Communications, 2015, 84 : 1265 - 1284
  • [47] Efficient Packet Routing in Highly Mobile Wireless Networks
    Moon, Cheoleun
    Kim, Yusung
    Kim, Dohyung
    Yoon, Hyunsoo
    Yeom, Ikjun
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) : 1265 - 1284
  • [48] A Trust Structure for Detection of Sybil Attacks in Opportunistic Networks
    Rashidibajgan, Samaneh
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 347 - 351
  • [49] A Secure Routing Mechanism Against Wormhole Attack in IPv6-based Wireless Sensor Networks
    Chen, Tao
    Huang, Haiping
    Chen, Zhengyu
    Wu, Yiming
    Jiang, Hao
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 110 - 115
  • [50] An Efficient Routing Algorithm for Opportunistic Networks based on Network Coding
    Yao, Yukun
    Liu, Zhihu
    Ren, Zhi
    Wen, Yadi
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 197 - 200