An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks

被引:1
|
作者
Alajeely, Majeed [1 ]
Ahmad, Asma'a [1 ]
Doss, Robin [1 ]
Mak-Hau, Vicky [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic, Australia
来源
FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015 | 2015年 / 523卷
关键词
Opportunistic networks; Security; Packet dropping attacks; Denial-of-service; Malicious node detection;
D O I
10.1007/978-3-319-19210-9_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In our previous novel attack (Packet Faking Attack [1]) we presented a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. In this paper, we present an efficient detection mechanism against this type of attack where each node can detect the attack instead of the destination node. Our detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea, that is, the packet creation time of each packet. Simulation results show this robust mechanism achieves a very high accuracy, detection rate and good network traffic reduction.
引用
收藏
页码:84 / 100
页数:17
相关论文
共 50 条
  • [31] RETRACTED ARTICLE: Invariant packet feature with network conditions for efficient low rate attack detection in multimedia networks for improved QoS
    M. Suchithra
    M. Baskar
    J. Ramkumar
    P. Kalyanasundaram
    B. Amutha
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 5471 - 5477
  • [32] Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks
    Dou, Yueyue
    Zeng, Feng
    Li, Wenjia
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 60 - 70
  • [33] SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks
    Ciobanu, Radu-Ioan
    Dobre, Ciprian
    Dascalu, Mihai
    Trausan-Matu, Stefan
    Cristea, Valentin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 240 - 249
  • [34] Efficient Joint Detection and Defense Mechanism for DDoS Attack in SDN
    Zeng R.-F.
    Gao Y.
    Wang X.-W.
    Zhang B.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2020, 41 (09): : 1217 - 1222
  • [35] An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks
    Wu, Guowei
    Chen, Xiaojie
    Yao, Lin
    Lee, Youngjun
    Yim, Kangbin
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (03) : 1127 - 1141
  • [36] Efficient and Intelligent Attack Detection in Software Defined IoT Networks
    Zhang, Yuntong
    Xu, Jingye
    Wang, Zhiwei
    Geng, Rong
    Choo, Kim-Kwang Raymond
    Arturo Perez-Diaz, Jesus
    Zhu, Dakai
    2020 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2020,
  • [37] A Supervised Early Attack Detection Mechanism for Smart Grid Networks
    Salehpour, Aliasghar
    Al-Anbagi, Irfan
    Yow, Kin-Choong
    Cheng, Xiaolin
    2023 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE, ISGT, 2023,
  • [38] A Novel Sybil Attack Detection Mechanism for Mobile IoT Networks
    Dogan-Tusha, Seda
    Althunibat, Saud
    Qaraqe, Marwa
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1838 - 1843
  • [39] Side channel monitoring: Packet drop attack detection in wireless ad hoc networks
    Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON N2L 3G1, Canada
    IEEE Int Conf Commun, 2011,
  • [40] Connection status aware cost efficient message transmission mechanism in opportunistic networks
    Broadband Ubiquitous Network Research Laboratory, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
    Tongxin Xuebao, 2013, 3 (44-52):