Stealth attacks on ad-hoc wireless networks

被引:5
|
作者
Jakobsson, M [1 ]
Wetzel, S [1 ]
Yener, B [1 ]
机构
[1] RSA Labs, Bedford, MA 01730 USA
关键词
D O I
10.1109/VETECF.2003.1285396
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hijack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are "stealth attacks" in that they minimize the cost to and visibility of the attacker. We introduce the notion of reputation based control, and suggest that it can be used to augment existing routing protocols in order to immunize these against stealth attacks.
引用
收藏
页码:2103 / 2111
页数:9
相关论文
共 50 条
  • [1] Wireless ad-hoc control networks
    Bu, SR
    Naghdy, F
    [J]. 2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 839 - 844
  • [2] Ad-hoc, mobile, and wireless networks
    Palattella, Maria Rita
    Scanzio, Stefano
    [J]. INTERNET TECHNOLOGY LETTERS, 2021, 4 (04)
  • [3] Ad-hoc filesystem: A novel network Filesystem for ad-hoc wireless networks
    Yasuda, K
    Hagino, T
    [J]. NETWORKING - ICN 2001, PART II, PROCEEDINGS, 2001, 2094 : 177 - 185
  • [4] Defense against injecting traffic attacks in wireless mobile ad-hoc networks
    Yu, Wei
    Liu, K. J. Ray
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (02) : 227 - 239
  • [5] TTM: An efficient mechanism to detect wormhole attacks in Wireless Ad-Hoc Networks
    Van Tran, Phuong
    Hung, Le Xuan
    Lee, Young-Koo
    Lee, Sungyung
    Lee, Heejo
    [J]. 2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 593 - +
  • [6] Coverage in wireless ad-hoc sensor networks
    Li, XY
    Wan, PJ
    Frieder, O
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 3174 - 3178
  • [7] Modeling Trust in Wireless Ad-Hoc Networks
    Ghosh, Tirthankar
    Xu, Hui
    [J]. NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 217 - 221
  • [8] Security in wireless ad-hoc networks - A survey
    Di Pietro, R.
    Guarino, S.
    Verde, N. V.
    Domingo-Ferrer, J.
    [J]. COMPUTER COMMUNICATIONS, 2014, 51 : 1 - 20
  • [9] Controlled flooding in wireless ad-hoc networks
    Rahman, A
    Olesinski, W
    Gburzynski, P
    [J]. 2004 INTERNATIONAL WORKSHOP ON WIRELESS AD-HOC NETWORKS, 2005, : 73 - 78
  • [10] Frugal flouting on wireless ad-hoc networks
    Ercal, Gunes
    Lzhak-Ratzin, Rafit
    Majun-Idar, Rupak
    Meyerson, Adam
    [J]. ALGORITHMIC GAME THEORY, PROCEEDINGS, 2008, 4997 : 133 - 144