首页> 外文期刊>Wireless personal communications: An Internaional Journal >Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
【24h】

Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks

机译:无线Ad Hoc网络中的单专家中继攻击防御机制

获取原文
获取原文并翻译 | 示例
           

摘要

There have been many security protocols to provide authenticity and confidentiality in wireless ad hoc networks. However, they fail to defend networks against relaying attack in which attacker nodes simply broadcast received packets without compromising any legitimate nodes. Wormhole attack is a representative example of relaying attack, in which a pair of attacker nodes relay received packets to each other and selectively drop them. The wormhole attack is known to ruin routing and communication of a network considerably, however, is not very straightforward to be accomplished due to the pairwise nature. In this paper, we introduce two new types of relaying attack, called teleport and filtering attacks that require a single attacker node only for accomplishment. We describe their accomplishment conditions and impacts on the network performance in a formal manner. We then propose a countermeasure framework against these attacks called Single-Adversary Relaying Attack defense Mechanism (SARAM), which is composed of a bandwidth-efficient neighbor discovery customized for multi-hop environments and neighbor list management combined into an on-demand ad hoc routing protocol. SARAM does not require any special hardware such as location-aware equipments and tight synchronized clocks, thus is cost-efficient as well. We show via ns-2 simulation that the new relaying attacks deteriorate the network performance significantly and SARAM is effective and efficient in defending a network against these attacks.
机译:有许多安全协议可在无线自组织网络中提供真实性和机密性。但是,它们无法防御中继攻击,在这种中继中,攻击者节点仅广播接收的数据包而不会损害任何合法节点。蠕虫攻击是中继攻击的代表示例,其中一对攻击者节点将接收到的数据包彼此中继并选择性地丢弃它们。众所周知,蠕虫攻击会严重破坏网络的路由和通信,但是由于成对的特性,实现起来并不是很简单。在本文中,我们介绍了两种新的中继攻击类型,称为传送和过滤攻击,仅需单个攻击者节点即可完成。我们以正式的方式描述了它们的完成条件及其对网络性能的影响。然后,我们提出一种针对这些攻击的对策框架,称为单专家中继攻击防御机制(SARAM),该机制由针对多跳环境定制的具有带宽效率的邻居发现和邻居列表管理组合成按需临时路由协议。 SARAM不需要任何特殊的硬件,例如位置感知设备和紧密同步的时钟,因此也具有成本效益。我们通过ns-2模拟表明,新的中继攻击会大大降低网络性能,并且SARAM在防御网络遭受这些攻击方面非常有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号