Abstract
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In our previous novel attack (Packet Faking Attack [1]) we presented a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. In this paper, we present an efficient detection mechanism against this type of attack where each node can detect the attack instead of the destination node. Our detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea, that is, the packet creation time of each packet. Simulation results show this robust mechanism achieves a very high accuracy, detection rate and good network traffic reduction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alajeely, M., Ahmad, A., Doss, R., Mak-Hau, V.: Packet faking attack: a novel attack and detection mechanism in OppNets. In: 2014 IEEE Tenth International Conference on Computational Intelligence and Security (CIS), pp. 638–642, November 2014
Obaidat, M., Woungang, I., Dhurandher, S., Koo, V.: Preventing packet dropping and message tampering attacks on AODV-based mobile ad hoc networks. In: International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1–5, May 2012
Lee, S., Choi, Y.: A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–70, October 2006
Sen, J., Chandra, M., Balamuralidhar, P., Harihara, S., Reddy, H.: A distributed protocol for detection of packet dropping attack in mobile ad hoc networks. In: IEEE International Conference on Telecommunications and Malaysia International Conference on Communication, pp. 75–80, May 2007
Lee, S., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. In: IEEE International Conference on Communications, vol. 10, pp. 3201–3205 (2001)
Lu, Y., Wong, V.: An energy-efficient multipath routing protocol for wireless sensor networks. Int. J. Commun. Syst. 20(7), 747–766 (2007)
Ke, M., Nenghai, Y., Bin, L.: A new packet dropping policy in delay tolerant network. In: Twelfth IEEE International Conference on Communication Technology (ICCT), pp. 337–380, November 2010
Sultana, S., Bertino, E., Shehab, M.: A Provenance based mechanism to identify malicious packet dropping adversaries in sensor networks. In: Proceedings of the 2011 Thirty First International Conference on Distributed Computing Systems Workshops, pp. 332–338, June 2011
Zhang, X., Jain, A., Perrig, A.: Packet-dropping adversary identification for data plane security. In: Proceedings of the 2008 ACM CoNEXT Conference, December 2008
Carbunar, B., Ioannidis, I., Nita-Rotaru, C.: JANUS: towards robust and malicious resilient routing in hybrid wireless networks. In: Proceedings of the Third ACM Workshop on Wireless Security, pp. 11–20 (2004)
Baadache, A., Belmehdi, A.: Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. J. Netw. Comput. Appl. 35(3), 1130–1139 (2012)
Chuah, M., Yang, P.: Impact of selective dropping attacks on network coding performance in DTNs and a potential mitigation scheme. In: Proceedings of the Eighteenth International Conference on Computer Communications and Networks, pp. 1–6, August 2009
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)
Nasser, N., Chen, Y.: Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In: IEEE International Conference on Communications, pp. 1154–1159, June 2007
Zouridaki, C., Mark, B., Hejmo, M., Thomas, R.: A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 1–10, November 2005
Sun, H., Chen, C., Hsu, L., Chen, Y., Chen, Y.: Reliable data transmission against packet dropping misbehavior in wireless ad hoc networks. In: IET International Communication Conference on Wireless Mobile and Computing, pp. 419–424, November 2011
Vasantha, V., Manimegalai, D.: Mitigating routing misbehaviors using subjective trust model in mobile ad hoc networks. In: Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, vol. 4, 417–422 (2007)
Jianhua, S., ChuanXiang, M.: A reputation-based scheme against malicious packet dropping for mobile ad hoc networks. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), vol. 3, 113–117 (2009)
Devi, K., Damodharan, P.: Detecting misbehavior routing and attacks in disruption tolerant network using itrm. In: International Conference on Current Trends in Engineering and Technology, pp. 334–337, July 2013
Zhang, X., Wu, S., Fu, Z., Wu, T.: Malicious packet dropping: How it might impact the TCP performance and how we can detect it. In: Proceedings of the 2000 IEEE International Conference on Network Protocols, pp. 263–272 (2000)
Keränen, A., Ott, J., Kärkkäinen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the Second International Conference on Simulation Tools and Techniques, pp. 1–10, March 2009
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Alajeely, M., Ahmad, A., Doss, R., Mak-Hau, V. (2015). An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks. In: Doss, R., Piramuthu, S., ZHOU, W. (eds) Future Network Systems and Security. FNSS 2015. Communications in Computer and Information Science, vol 523. Springer, Cham. https://doi.org/10.1007/978-3-319-19210-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-19210-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19209-3
Online ISBN: 978-3-319-19210-9
eBook Packages: Computer ScienceComputer Science (R0)