Deakin University
Browse

File(s) under permanent embargo

Defense against packet collusion attacks in opportunistic networks

journal contribution
posted on 2017-03-01, 00:00 authored by Majeed AlajeelyMajeed Alajeely, Robin Ram Mohan DossRobin Ram Mohan Doss, Asma'a Ahmad, Vicky MakVicky Mak
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics such as an open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nor destination nodes have control over the behaviour of intermediate nodes in the network. Consequently, the knowledge of where or when packets are/will be dropped is difficult to gather. In this paper, we present a novel attack and traceback mechanism against a special type of packet dropping attacks – packet collusion attacks, where the malicious node(s) drops some or all packets and then injects new fake packets in their place to mask the packet dropping. Our novel detection and traceback mechanism is based on the concept of a Merkle (or hash) tree and simulation results show it to be highly effective and accurate in terms of detecting attack instances and tracing back to the malicious node(s) in the network that is the attack source.

History

Journal

Computers & security

Volume

65

Pagination

269 - 282

Publisher

Elsevier

Location

Amsterdam, The Netherlands

ISSN

0167-4048

Language

eng

Publication classification

C Journal article; C1 Refereed article in a scholarly journal

Copyright notice

2016, Elsevier Ltd