Malicious node traceback in opportunistic networks using merkle trees


Autoria(s): Alajeely, Majeed; Ahmad, Asma'a; Doss, Robin
Contribuinte(s)

Chen, J.

Yang, L.T.

Data(s)

01/01/2015

Resumo

Security is a major challenge in Opportunistic Networks because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In this paper, we present a malicious nodes detection mechanism against a special type of packet dropping attack where the malicious node drops one or more packets and then injects new fake packets instead. Our novel detection and traceback mechanism is very powerful and has very high accuracy. Each node can detect and then traceback the malicious nodes based on a solid and powerful idea that is, Merkle tree hashing technique. In our defense techniques we have two stages. The first stage is to detect the attack, and the second stage is to find the malicious nodes. We have compared our approach with the acknowledgement based mechanisms and the networks coding based mechanism which are well known approaches in the literature. Simulation results show this robust mechanism achieves a very high accuracy and detection rate.

Identificador

http://hdl.handle.net/10536/DRO/DU:30083232

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30083232/doss-maliciousnode-2015.pdf

http://dro.deakin.edu.au/eserv/DU:30083232/doss-maliciousnode-evid1-2015.pdf

http://dro.deakin.edu.au/eserv/DU:30083232/doss-maliciousnode-evid2-2015.pdf

http://www.dx.doi.org/10.1109/DSDIS.2015.86

Direitos

2015, IEEE

Palavras-Chave #opportunistic networks #OppNets #security #packet dropping attacks #denial-of-service #malicious node detection
Tipo

Conference Paper