Skip to main content

An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks

  • Conference paper
  • First Online:
Future Network Systems and Security (FNSS 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 523))

Included in the following conference series:

Abstract

Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, such as open medium, dynamic topology, no centralized management and absent clear lines of defense. A packet dropping attack is one of the major security threats in OppNets since neither source nodes nor destination nodes have the knowledge of where or when the packet will be dropped. In our previous novel attack (Packet Faking Attack [1]) we presented a special type of packet dropping where the malicious node drops one or more packets and then injects new fake packets instead. In this paper, we present an efficient detection mechanism against this type of attack where each node can detect the attack instead of the destination node. Our detection mechanism is very powerful and has very high accuracy. It relies on a very simple yet powerful idea, that is, the packet creation time of each packet. Simulation results show this robust mechanism achieves a very high accuracy, detection rate and good network traffic reduction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alajeely, M., Ahmad, A., Doss, R., Mak-Hau, V.: Packet faking attack: a novel attack and detection mechanism in OppNets. In: 2014 IEEE Tenth International Conference on Computational Intelligence and Security (CIS), pp. 638–642, November 2014

    Google Scholar 

  2. Obaidat, M., Woungang, I., Dhurandher, S., Koo, V.: Preventing packet dropping and message tampering attacks on AODV-based mobile ad hoc networks. In: International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1–5, May 2012

    Google Scholar 

  3. Lee, S., Choi, Y.: A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–70, October 2006

    Google Scholar 

  4. Sen, J., Chandra, M., Balamuralidhar, P., Harihara, S., Reddy, H.: A distributed protocol for detection of packet dropping attack in mobile ad hoc networks. In: IEEE International Conference on Telecommunications and Malaysia International Conference on Communication, pp. 75–80, May 2007

    Google Scholar 

  5. Lee, S., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. In: IEEE International Conference on Communications, vol. 10, pp. 3201–3205 (2001)

    Google Scholar 

  6. Lu, Y., Wong, V.: An energy-efficient multipath routing protocol for wireless sensor networks. Int. J. Commun. Syst. 20(7), 747–766 (2007)

    Article  Google Scholar 

  7. Ke, M., Nenghai, Y., Bin, L.: A new packet dropping policy in delay tolerant network. In: Twelfth IEEE International Conference on Communication Technology (ICCT), pp. 337–380, November 2010

    Google Scholar 

  8. Sultana, S., Bertino, E., Shehab, M.: A Provenance based mechanism to identify malicious packet dropping adversaries in sensor networks. In: Proceedings of the 2011 Thirty First International Conference on Distributed Computing Systems Workshops, pp. 332–338, June 2011

    Google Scholar 

  9. Zhang, X., Jain, A., Perrig, A.: Packet-dropping adversary identification for data plane security. In: Proceedings of the 2008 ACM CoNEXT Conference, December 2008

    Google Scholar 

  10. Carbunar, B., Ioannidis, I., Nita-Rotaru, C.: JANUS: towards robust and malicious resilient routing in hybrid wireless networks. In: Proceedings of the Third ACM Workshop on Wireless Security, pp. 11–20 (2004)

    Google Scholar 

  11. Baadache, A., Belmehdi, A.: Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. J. Netw. Comput. Appl. 35(3), 1130–1139 (2012)

    Article  Google Scholar 

  12. Chuah, M., Yang, P.: Impact of selective dropping attacks on network coding performance in DTNs and a potential mitigation scheme. In: Proceedings of the Eighteenth International Conference on Computer Communications and Networks, pp. 1–6, August 2009

    Google Scholar 

  13. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  14. Nasser, N., Chen, Y.: Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In: IEEE International Conference on Communications, pp. 1154–1159, June 2007

    Google Scholar 

  15. Zouridaki, C., Mark, B., Hejmo, M., Thomas, R.: A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 1–10, November 2005

    Google Scholar 

  16. Sun, H., Chen, C., Hsu, L., Chen, Y., Chen, Y.: Reliable data transmission against packet dropping misbehavior in wireless ad hoc networks. In: IET International Communication Conference on Wireless Mobile and Computing, pp. 419–424, November 2011

    Google Scholar 

  17. Vasantha, V., Manimegalai, D.: Mitigating routing misbehaviors using subjective trust model in mobile ad hoc networks. In: Proceedings of the International Conference on Computational Intelligence and Multimedia Applications, vol. 4, 417–422 (2007)

    Google Scholar 

  18. Jianhua, S., ChuanXiang, M.: A reputation-based scheme against malicious packet dropping for mobile ad hoc networks. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), vol. 3, 113–117 (2009)

    Google Scholar 

  19. Devi, K., Damodharan, P.: Detecting misbehavior routing and attacks in disruption tolerant network using itrm. In: International Conference on Current Trends in Engineering and Technology, pp. 334–337, July 2013

    Google Scholar 

  20. Zhang, X., Wu, S., Fu, Z., Wu, T.: Malicious packet dropping: How it might impact the TCP performance and how we can detect it. In: Proceedings of the 2000 IEEE International Conference on Network Protocols, pp. 263–272 (2000)

    Google Scholar 

  21. Keränen, A., Ott, J., Kärkkäinen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the Second International Conference on Simulation Tools and Techniques, pp. 1–10, March 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majeed Alajeely .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Alajeely, M., Ahmad, A., Doss, R., Mak-Hau, V. (2015). An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks. In: Doss, R., Piramuthu, S., ZHOU, W. (eds) Future Network Systems and Security. FNSS 2015. Communications in Computer and Information Science, vol 523. Springer, Cham. https://doi.org/10.1007/978-3-319-19210-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19210-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19209-3

  • Online ISBN: 978-3-319-19210-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics