Defense against packet dropping attacks in opportunistic networks


Autoria(s): Ahmad, Asma'a; Alajeely, Majeed; Doss, Robin
Contribuinte(s)

[Unknown]

Data(s)

01/01/2014

Resumo

Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. Many protocols have been developed to accommodate the features of OppNets such as frequent partitions, long delays, and no end-to-end path between the source and destination nodes. Embedding security into these protocols is challenging and has taken a lot of attention in research. One of the attacks that OppNets are exposed to is the packet dropping attack, where the malicious node attempts to drop some packets and forwards an incomplete number of packets which results in the distortion of the message. To increase the security levels in OppNets, this paper presents an algorithm developed to detect packet dropping attacks, and finds the malicious node that attempted the attack. The algorithm detects the attack by using an indicative field in the header section of each packet; the indicative field has 3 sub fields - the identification field, the flag field, and the offset field. These 3 fields are used to find if a node receives the complete original number of packets from the previous node. The algorithm will have the advantage of detecting packets dropped by each intermediate node, this helps solve the difficulties of finding malicious nodes by the destination node only.

Identificador

http://hdl.handle.net/10536/DRO/DU:30070306

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30070306/ahmad-defenseagainst-2014.pdf

http://dro.deakin.edu.au/eserv/DU:30070306/ahmad-defenseagainst-evid1-2014.pdf

http://dro.deakin.edu.au/eserv/DU:30070306/ahmad-defenseagainst-evid2-2014.pdf

Direitos

2014, IEEE

Tipo

Conference Paper