RESCUE: A Resilient and Secure Device-to-Device Communication Framework for Emergencies

被引:5
作者
Stute, Milan [1 ]
Kohnhaeuser, Florian [2 ]
Baumgartner, Lars [3 ]
Almon, Lars [1 ]
Hollick, Matthias [1 ]
Katzenbeisser, Stefan [4 ]
Freisleben, Bernd [5 ]
机构
[1] Tech Univ Darmstadt, Secure Mobile Networking Lab, D-64289 Darmstadt, Germany
[2] Tech Univ Darmstadt, Secur Engn Grp, D-64289 Darmstadt, Germany
[3] Tech Univ Darmstadt, Software Technol Grp, D-64289 Darmstadt, Germany
[4] Univ Passau, Fac Comp Sci & Math, D-94032 Passau, Germany
[5] Philipps Univ Marburg, Dept Math & Comp Sci, D-35037 Marburg, Germany
关键词
Routing; Protocols; Peer-to-peer computing; Epidemics; Cryptography; Device-to-device communication; Terrorism; Disruption-tolerant networking; routing; denial-of-service mitigation; Sybil attack; flooding attack; buffer management; ATTACKS;
D O I
10.1109/TDSC.2020.3036224
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
During disasters, existing telecommunication infrastructures are often congested or even destroyed. In these situations, mobile devices can form a backup communication network for civilians and emergency services using disruption-tolerant networking (DTN) principles. Unfortunately, such distributed and resource-constrained networks are particularly susceptible to a wide range of attacks such as terrorists trying to cause more harm. In this article, we present RESCUE, a resilient and secure device-to-device communication framework for emergency scenarios that provides comprehensive protection against common attacks. RESCUE features a minimalistic DTN protocol that, by design, is secure against notable attacks such as routing manipulations, dropping, message manipulations, blackholing, or impersonation. To further protect against message flooding and Sybil attacks, we present a twofold mitigation technique. First, a mobile and distributed certificate infrastructure particularly tailored to the emergency use case hinders the adversarial use of multiple identities. Second, a message buffer management scheme significantly increases resilience against flooding attacks, even if they originate from multiple identities, without introducing additional overhead. Finally, we demonstrate the effectiveness of RESCUE via large-scale simulations in a synthetic as well as a realistic natural disaster scenario. Our simulation results show that RESCUE achieves very good message delivery rates, even under flooding and Sybil attacks.
引用
收藏
页码:1722 / 1734
页数:13
相关论文
共 36 条
[31]  
Wiesmaier A., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, P176, DOI [10.1145/1966913.1966936, DOI 10.1145/1966913.1966936]
[32]  
Yiu Joseph., 2015, ARMv8-M architecture technical overview
[33]   SybilGuard: Defending against sybil attacks via social networks [J].
Yu, Haifeng ;
Kaminsky, Michael ;
Gibbons, Phillip B. ;
Flaxman, Abraham .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) :267-278
[34]   SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks [J].
Yu, Haifeng ;
Gibbons, Phillip B. ;
Kaminsky, Michael ;
Xiao, Feng .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (03) :885-898
[35]   Performance modeling of epidemic routing [J].
Zhang, Xiaolan ;
Neglia, Giovanni ;
Kurose, Jim ;
Towsley, Don .
COMPUTER NETWORKS, 2007, 51 (10) :2867-2891
[36]   Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis [J].
Zheng, Jing ;
Li, Qi ;
Gu, Guofei ;
Cao, Jiahao ;
Yau, David K. Y. ;
Wu, Jianping .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (07) :1838-1853