Slander Resistant Attacker Isolation in Ad Hoc Networks

This paper focuses on how to isolate attackers that inject packets to cause Denial-of-Service (DoS) in ad hoc networks. Our security analysis shows that current hop-by-hop source authentication protocols only partially achieve the defence goals, although they allow legitimate nodes to effectively id...

Full description

Saved in:
Bibliographic Details
Main Authors: GU, Q., CHU, Chao-Hsien, LIU, Peng, ZHU, S.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2005
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/317
http://dx.doi.org/10.1504/IJMNDI.2006.012086
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1316
record_format dspace
spelling sg-smu-ink.sis_research-13162010-09-24T05:42:03Z Slander Resistant Attacker Isolation in Ad Hoc Networks GU, Q. CHU, Chao-Hsien LIU, Peng ZHU, S. This paper focuses on how to isolate attackers that inject packets to cause Denial-of-Service (DoS) in ad hoc networks. Our security analysis shows that current hop-by-hop source authentication protocols only partially achieve the defence goals, although they allow legitimate nodes to effectively identify and discard injected or modified packets. The other important defence goal, which has not been achieved yet, is to isolate the attackers so that they cannot inject in the future. Current authentication protocols provide evidence of injection attacks, since injected packets will incur verification failures. Nevertheless, the evidence may be exploited by attackers to deceive defenders. We find that a non-injection attacker can slander any good forwarding node in a route by modifying the authentication information carried in the packets. In order to correctly isolate suspicious nodes, we propose a new authentication approach. The approach not only preserve the function to filter junk packets as in current authentication approaches, but also help to isolate the attackers with a high probability. This approach ensures that defenders can focus on investigating only two nodes to find out the real attacker once failed verifications are detected. 2005-11-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/317 info:doi/10.1504/IJMNDI.2006.012086 http://dx.doi.org/10.1504/IJMNDI.2006.012086 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
GU, Q.
CHU, Chao-Hsien
LIU, Peng
ZHU, S.
Slander Resistant Attacker Isolation in Ad Hoc Networks
description This paper focuses on how to isolate attackers that inject packets to cause Denial-of-Service (DoS) in ad hoc networks. Our security analysis shows that current hop-by-hop source authentication protocols only partially achieve the defence goals, although they allow legitimate nodes to effectively identify and discard injected or modified packets. The other important defence goal, which has not been achieved yet, is to isolate the attackers so that they cannot inject in the future. Current authentication protocols provide evidence of injection attacks, since injected packets will incur verification failures. Nevertheless, the evidence may be exploited by attackers to deceive defenders. We find that a non-injection attacker can slander any good forwarding node in a route by modifying the authentication information carried in the packets. In order to correctly isolate suspicious nodes, we propose a new authentication approach. The approach not only preserve the function to filter junk packets as in current authentication approaches, but also help to isolate the attackers with a high probability. This approach ensures that defenders can focus on investigating only two nodes to find out the real attacker once failed verifications are detected.
format text
author GU, Q.
CHU, Chao-Hsien
LIU, Peng
ZHU, S.
author_facet GU, Q.
CHU, Chao-Hsien
LIU, Peng
ZHU, S.
author_sort GU, Q.
title Slander Resistant Attacker Isolation in Ad Hoc Networks
title_short Slander Resistant Attacker Isolation in Ad Hoc Networks
title_full Slander Resistant Attacker Isolation in Ad Hoc Networks
title_fullStr Slander Resistant Attacker Isolation in Ad Hoc Networks
title_full_unstemmed Slander Resistant Attacker Isolation in Ad Hoc Networks
title_sort slander resistant attacker isolation in ad hoc networks
publisher Institutional Knowledge at Singapore Management University
publishDate 2005
url https://ink.library.smu.edu.sg/sis_research/317
http://dx.doi.org/10.1504/IJMNDI.2006.012086
_version_ 1770570384662331392