An efficient detection mechanism against packet faking attack in opportunistic networks

Alajeely, Majeed, Ahmad, Asma'a, Doss, Robin and Mak-Hau, Vicky 2015, An efficient detection mechanism against packet faking attack in opportunistic networks. In Doss, Robin, Piramuthu, Selwyn and Zhou, Wei (ed), Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Springer, Berlin, Germany, pp.84-100, doi: 10.1007/978-3-319-19210-9_6.

Attached Files
Name Description MIMEType Size Downloads

Title An efficient detection mechanism against packet faking attack in opportunistic networks
Author(s) Alajeely, Majeed
Ahmad, Asma'a
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Mak-Hau, VickyORCID iD for Mak-Hau, Vicky orcid.org/0000-0002-9306-5780
Title of book Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings
Editor(s) Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Piramuthu, Selwyn
Zhou, Wei
Publication date 2015
Series Communications in computer and information science; v.523
Chapter number 6
Total chapters 15
Start page 84
End page 100
Total pages 17
Publisher Springer
Place of Publication Berlin, Germany
Keyword(s) opportunistic networks
security
packet dropping attacks
denial-of-service
malicious node detection
Summary Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In our previous novel attack (Packet Faking Attack [1]) we presented a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. In this paper, we present an efficient detection mechanism against this type of attack where each node can detect the attack instead of the destination node. Our detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea, that is, the packet creation time of each packet. Simulation results show this robust mechanism achieves a very high accuracy, detection rate and good network traffic reduction.
ISBN 9783319192093
ISSN 1865-0929
1865-0937
Language eng
DOI 10.1007/978-3-319-19210-9_6
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
Copyright notice ©2015, Springer
Persistent URL http://hdl.handle.net/10536/DRO/DU:30076952

Document type: Book Chapter
Collections: School of Information Technology
ERA Postprints
2018 ERA Submission
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 265 Abstract Views, 12 File Downloads  -  Detailed Statistics
Created: Tue, 08 Mar 2016, 13:15:38 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.