Packet faking attack: a novel attack and detection mechanism in OppNets
Contribuinte(s) |
[Unknown] |
---|---|
Data(s) |
01/01/2014
|
Resumo |
Security is a major challenge in Opportunistic Networks (OppNets) due to its characteristics of being an open medium with dynamic topology, there is neither a centralized management nor clear lines of defence. A packet dropping attack is one of the major security threats in OppNets as neither source nodes nor destination nodes have any knowledge of when or where a packet will be dropped. In this paper, we present a novel attack and detection mechanism against a special type of packet dropping where the malicious node drops one packet or more and injects a new fake packet instead. Our novel detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea; the creation time of each packet. Significant results show this robust mechanism achieves a very high accuracy and detection rate. |
Identificador | |
Idioma(s) |
eng |
Publicador |
IEEE |
Relação |
http://dro.deakin.edu.au/eserv/DU:30070305/alajeely-packetfaking-2014.pdf |
Direitos |
2014, IEEE |
Palavras-Chave | #Denial-of-service #Malicious node detection #Opportunistic networks #Packet dropping attacks #Security |
Tipo |
Conference Paper |