From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks

被引:0
|
作者
Xing, Kai [1 ]
Cheng, Xiuzhen [2 ]
机构
[1] Univ Sci & Technol China, Dept Comp Sci & Tech, Suzhou Inst Adv Study, Hefei 230027, Anhui, Peoples R China
[2] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
mobile ad hoc networks (MANETs); node replication attacks; clone attacks; insider attacks; SENSOR NETWORKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wireless devices are often not protected by tamper-resistant hardware due to small form factors and low cost, and can be easily stolen/lost or temporarily controlled by unauthorized entities due to their harsh working environments. A serious consequence of the device capture attack is the node replication attacks in which adversaries deploy a large number of replicas of the compromised/captured nodes throughout the network. Replicated nodes have all legitimate security credentials and therefore can launch various insider attacks, or even take over the network easily. They are indeed "attack multipliers" and therefore are extremely destructive to the network. Detecting replication attacks is a nontrivial problem in MANETs due to the challenges resulted from node mobility, cloned/compromised node collusion, and the large number and wide spread of the replicas. Existing approaches either fail in mobile environments due to the limitations caused by local views or their dependence on invariant claims such as location and neighbor list, or are constrained by the number, distribution, and colluding activities of the replicas. In this paper, we propose two replication detection schemes (TDD and SDD) to tackle all these challenges from both the time domain and the space domain. Our theoretical analysis indicates that TDD and SDD provide high detection accuracy and excellent resilience against smart and colluding replicas, have no restriction on the number and distribution of replicas, and incur low communication/computation overhead. To our best knowledge, TDD and SDD are the only approaches that support mobile networks while place no restrictions on the number and distribution of the cloned frauds and on whether the replicas collude or not.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Replica update strategies in mobile ad hoc networks
    Lu, H
    Denko, MK
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 302 - 306
  • [2] A survey of Attacks in Mobile Ad hoc Networks
    Meddeb, Rahma
    Triki, Bayrem
    Jemili, Arah
    Korbaa, Ouajdi
    [J]. 2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2017,
  • [3] Interlayer attacks in mobile ad hoc networks
    Guang, Lei
    Assi, Chadi
    Benslimane, Abderrahim
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 436 - +
  • [4] Classification of Mobile Ad Hoc Networks Attacks
    Sbai, Oussama
    Elboukhari, Mohamed
    [J]. 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 618 - 624
  • [5] MOTION: An Application of ASMETA to Mobile Ad-hoc NETworks Domain
    Bevilacqua, Gianluca Gennaro
    Bianchi, Alessandro
    [J]. ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
  • [6] Detecting Sybil attacks in vehicular ad hoc networks
    Hamdan S.
    Hudaib A.
    Awajan A.
    [J]. Hamdan, Salam (S.hamdan@psut.edu.jo), 1600, Taylor and Francis Ltd. (36): : 69 - 79
  • [7] Crossing Over the Bounded Domain: From Exponential to Power-Law Intermeeting Time in Mobile Ad Hoc Networks
    Cai, Han
    Eun, Do Young
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (05) : 1578 - 1591
  • [8] Routing attacks and solutions in mobile ad hoc networks
    Geng Peng
    Zou Chuanyun
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 806 - +
  • [9] Masquerading Attacks Detection in Mobile Ad Hoc Networks
    Abbas, Sohail
    Faisal, Mohammad
    Rahman, Haseeb Ur
    Khan, Muhammad Zahid
    Merabti, Madjid
    Khan, Atta Ur Rehman
    [J]. IEEE ACCESS, 2018, 6 : 55013 - 55025
  • [10] A survey of routing attacks in mobile Ad Hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Nemoto, Yoshiaki
    Kato, Nei
    Jamalipour, Abbas
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 85 - 91