The Smallville Effect: Social Ties Make Mobile Networks More Secure Against Node Capture Attack

被引:0
|
作者
Conti, Mauro [1 ]
Di Pietro, Roberto [1 ]
Gabrielli, Andrea [1 ]
Mancini, Luigi V. [1 ]
Mei, Alessandro [1 ]
机构
[1] Vrije Univ Amsterdam, Dept Comp Sci, NL-1081 HV Amsterdam, Netherlands
关键词
Ad Hoc network security; social network; node capture attack detection; distributed protocol; resilience; efficiency; node revocation; RANDOM WAYPOINT; WIRELESS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile Ad Hoc networks, due to the unattended nature of the network itself and the dispersed location of nodes, are subject to several unique security issues. One of the most vexed security threat is node capture. A few solutions have already been proposed to address this problem; however, those solutions are either centralized or focused on theoretical mobility models alone. In the former case the solution does not fit well the distributed nature of the network while, in the latter case, the quality of the solutions obtained for realistic mobility models severely differs from the results obtained for theoretical models. The rationale of this paper is inspired by the observation that re-encounters of mobile nodes do elicit a form of social ties. Leveraging these ties, it is possible to design efficient and distributed algorithms that, with a moderated degree of node cooperation, enforce the emergent property of node capture detection. In particular, in this paper we provide a proof of concept proposing a set of algorithms that leverage, to different extent, node mobility and node cooperation that is, identifying social ties to thwart node capture attack. In particular, we test these algorithms on a realistic mobility scenario. Extensive simulations show the quality of the proposed solutions and, more important, the viability of the proposed approach.
引用
收藏
页码:99 / 106
页数:8
相关论文
共 13 条
  • [1] Modeling a node capture attack in a secure Wireless Sensor Networks
    Smache, Meriem
    El Mrabet, Nadia
    Gilquijano, Jesus-Javier.
    Tria, Assia
    Riou, Emmanuel
    Gregory, Chaput
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 188 - 193
  • [2] Emergent Properties: Detection of the Node-capture Attack in Mobile Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi V.
    Mei, Alessandro
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 214 - 219
  • [3] Securing Mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
    Qabulio, Mumtaz
    Malkani, Yasir Arfat
    Keerio, Ayaz
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 50 - 55
  • [4] Secure Decentralized Data Transfer against Node Capture Attacks for Wireless Sensor Networks
    Kohno, Eitaro
    Ohta, Tomoyuki
    Kakuda, Yoshiaki
    ISADS 2009: 2009 INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2009, : 35 - 40
  • [5] Security Of Mobile Wireless Sensor Networks Against Node Replication Attack In Healthcare Applications
    Sindhuja, L. S.
    Beatrice, B. Anuja
    INTERNATIONAL JOURNAL OF LIFE SCIENCE AND PHARMA RESEARCH, 2022, 12 : 102 - 109
  • [6] Analysis of the node isolation attack against OLSR-based mobile ad hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Kato, Nei
    Nemoto, Yoshiaki
    Jamalipour, Abbas
    ISCN '06: PROCEEDINGS OF THE 7TH INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORKS, 2006, : 30 - +
  • [7] Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
    Poongodi, T.
    Karthikeyan, M.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 1039 - 1050
  • [8] Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks
    T. Poongodi
    M. Karthikeyan
    Wireless Personal Communications, 2016, 90 : 1039 - 1050
  • [9] A lightweight algorithm against replica node attack in mobile wireless sensor networks using learning agents
    Jamshidi M.
    Poor S.S.A.
    Qader N.N.
    Esnaashari M.
    Meybodi M.R.
    IEIE Transactions on Smart Processing and Computing, 2019, 8 (01): : 58 - 70
  • [10] Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
    Khan, Wazir Zada
    Saad, Mohamad Naufal bin Mohamad
    Aalsalem, Mohammed Y.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 119 - 127