首页> 外文会议>International Conference on Privacy and Security in Mobile Systems;Global Wireless Summit >Misbehavior detection and isolation in peer-to-peer networks with the presence of hidden nodes
【24h】

Misbehavior detection and isolation in peer-to-peer networks with the presence of hidden nodes

机译:存在隐藏节点的对等网络中的不当行为检测和隔离

获取原文

摘要

All smartphones and tablets are currently equipped with Network Interface Cards (NIC) that use IEEE 802.11 family to access Wi-Fi networks or communicate in a peer-to-peer model, which is the topic of this paper. This paper presents a novel technique to detect and isolate a rogue user that modified the firmware on the device's NIC card to capture the channel either to disrupt the communication or to illegally increase its own node throughput in a wireless network with hidden nodes present at the expense of other nodes in the network. The attacker modifies the NIC (Network Card Interface) firmware that is using IEEE 802.11 DCF to deviate from the normal back-off mechanism specified by the IEEE standard which significantly increases the successful probabilities of its packet transmissions. The attacker node only backs off one slot every time it has a packet to transmit or when it experiences a collision. As a result, the attacker captures the channel (Bandwidth) and prevents others from sharing the bandwidth. The attacker forces the NIC to have a firmware upgrade that contains the malicious code. The proposed algorithm detects the attacker in a network with the presence of hidden nodes. The paper's main contributions are: a new method to model Markov Chain to account for the hidden nodes' throughputs, a detection algorithm, and an isolation technique to isolate the attacker.
机译:当前,所有智能手机和平板电脑都配备了网络接口卡(NIC),这些接口卡使用IEEE 802.11系列来访问Wi-Fi网络或以对等模型进行通信,这是本文的主题。本文提出了一种检测和隔离恶意用户的新颖技术,该恶意用户修改了设备NIC卡上的固件以捕获通道,从而破坏了通信或非法增加了无线网络中的节点吞吐量,而隐藏节点的存在却以牺牲为代价。网络中其他节点的数量。攻击者修改了使用IEEE 802.11 DCF的NIC(网卡接口)固件,以偏离IEEE标准指定的常规退避机制,这大大增加了其数据包传输的成功概率。攻击者节点每当有一个要发送的数据包或遇到冲突时,才退避一个时隙。结果,攻击者捕获了信道(带宽)并阻止其他人共享带宽。攻击者强迫NIC进行包含恶意代码的固件升级。所提出的算法在存在隐藏节点的情况下检测网络中的攻击者。本文的主要贡献是:一种新的为马尔可夫链建模以解决隐藏节点吞吐量的方法,一种检测算法以及一种隔离攻击者的隔离技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号