Stealth attacks on ad-hoc wireless networks

被引:5
|
作者
Jakobsson, M [1 ]
Wetzel, S [1 ]
Yener, B [1 ]
机构
[1] RSA Labs, Bedford, MA 01730 USA
关键词
D O I
10.1109/VETECF.2003.1285396
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hijack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are "stealth attacks" in that they minimize the cost to and visibility of the attacker. We introduce the notion of reputation based control, and suggest that it can be used to augment existing routing protocols in order to immunize these against stealth attacks.
引用
收藏
页码:2103 / 2111
页数:9
相关论文
共 50 条
  • [21] A simulation framework for ad-hoc wireless networks
    ElSayes, M
    Ahmed, MH
    Mahmoud, S
    [J]. CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 989 - 992
  • [22] Grouped Black hole Attacks Security Model (GBHASM) for Wireless Ad-Hoc Networks
    Bajwa, Shahid Shehzad
    Khan, Muhammad Khalid
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 756 - 760
  • [23] Effects of Malicious Attacks in Mobile Ad-hoc Networks
    Kanthe, Ashok M.
    Simunic, Dina
    Prasad, Ramjee
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 1 - 5
  • [24] On measuring anonymity for wireless mobile ad-hoc networks
    Huang, Dijiang
    [J]. 31ST IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2006, : 779 - 786
  • [25] Cooperative network coding for wireless ad-hoc networks
    Fu, Shengli
    Lu, Kejie
    Qian, Yi
    Varanasi, Murali
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 812 - +
  • [26] Fair bandwidth allocation for wireless ad-hoc networks
    Guan Xinping
    Kai, Ma
    Long Chengnian
    [J]. PROCEEDINGS OF THE 26TH CHINESE CONTROL CONFERENCE, VOL 5, 2007, : 691 - +
  • [27] Coverage problems in wireless ad-hoc sensor networks
    Meguerdichian, S
    Koushanfar, F
    Potkonjak, M
    Srivastava, MB
    [J]. IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY, 2001, : 1380 - 1387
  • [28] Congestion Control Framework for Ad-Hoc Wireless Networks
    Christos Antonopoulos
    Stavros Koubias
    [J]. Wireless Personal Communications, 2010, 52 : 753 - 775
  • [29] Radio aspects of hybrid wireless ad-hoc networks
    Mantel, OC
    Scully, N
    Mawira, A
    [J]. IEEE VTC 53RD VEHICULAR TECHNOLOGY CONFERENCE, SPRING 2001, VOLS 1-4, PROCEEDINGS, 2001, : 1139 - 1143
  • [30] Effective of Transmission Power for Wireless Ad-Hoc Networks
    Pomsathit, Auttapon
    Lorphichian, Aekkarat
    Areerachakul, Sirilak
    [J]. INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2010), 2010, : 1962 - 1965