You are not logged in.

Catabolism attack and anabolism defense: a novel attack and traceback mechanism in opportunistic networks

Alajeely, Majeed, Doss, Robin, Ahmad, Asma’a and Mak-Hau, Vicky 2015, Catabolism attack and anabolism defense: a novel attack and traceback mechanism in opportunistic networks, Computer communications, vol. 71, pp. 111-118, doi: 10.1016/j.comcom.2015.10.004.

Attached Files
Name Description MIMEType Size Downloads

Title Catabolism attack and anabolism defense: a novel attack and traceback mechanism in opportunistic networks
Author(s) Alajeely, Majeed
Doss, RobinORCID iD for Doss, Robin orcid.org/0000-0001-6143-6850
Ahmad, Asma’a
Mak-Hau, VickyORCID iD for Mak-Hau, Vicky orcid.org/0000-0002-9306-5780
Journal name Computer communications
Volume number 71
Start page 111
End page 118
Total pages 8
Publisher Elsevier
Place of publication Amsterdam, The Netherlands
Publication date 2015-11-01
ISSN 1873-703X
Keyword(s) Opportunistic Networks
Security
Packet Dropping Attacks
Denial-of-Service
Malicious Node Detection
Science & Technology
Technology
Computer Science, Information Systems
Engineering, Electrical & Electronic
Telecommunications
Computer Science
Engineering
AD HOC NETWORKS
Summary Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense.A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In this paper, we present a novel attack and traceback mechanism against a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. We call this novel attack a Catabolism Attack and we call our novel traceback mechanism against this attack Anabolism Defense. Our novel detection and traceback mechanism is very powerful and has very high accuracy. Each node can detect and then traceback the malicious nodes based on a solid and powerful idea that is, hash chain techniques. In our defense techniques we have two stages. The first stage is to detect the attack, and the second stage is to find the malicious nodes. Simulation results show this robust mechanism achieves a very high accuracy and detection rate.
Language eng
DOI 10.1016/j.comcom.2015.10.004
Field of Research 0805 Distributed Computing
1005 Communications Technologies
0906 Electrical And Electronic Engineering
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, Elsevier
Persistent URL http://hdl.handle.net/10536/DRO/DU:30080627

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 134 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Tue, 08 Mar 2016, 16:34:12 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.