Defense Against Packet Injection in Ad Hoc Networks
Wireless ad hoc networks have very limited network resources and are thus susceptible to attacks that focus on resource exhaustion, such as the injection of junk packets. These attacks cause serious denial-of-service via wireless channel contention and network congestion. Although ad hoc network sec...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2007
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1785 http://dx.doi.org/10.1504/IJSN.2007.012832 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2784 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-27842013-03-15T10:12:03Z Defense Against Packet Injection in Ad Hoc Networks GU, Qijun LIU, Peng CHU, Chao-Hsien ZHU, Sencun Wireless ad hoc networks have very limited network resources and are thus susceptible to attacks that focus on resource exhaustion, such as the injection of junk packets. These attacks cause serious denial-of-service via wireless channel contention and network congestion. Although ad hoc network security has been extensively studied, most previous work focuses on secure routing, but cannot prevent attackers from injecting a large number of junk data packets into a route that has been established. We propose an on-demand hop-by-hop source authentication protocol, namely Source Authentication Forwarding (SAF), to defend against this type of packet injection attacks. The protocol can either immediately filter out injected junk packets with very high probability or expose the true identity of an injector. Unlike other forwarding defences, this protocol is designed to fit in the unreliable environment of ad hoc networks and incurs lightweight overhead in communication and computation. 2007-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/1785 info:doi/10.1504/IJSN.2007.012832 http://dx.doi.org/10.1504/IJSN.2007.012832 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University packet injection source authentication secure forwarding denial of service DoS attacks ad hoc networks wireless networks security junk data packets Computer Sciences Management Information Systems |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
packet injection source authentication secure forwarding denial of service DoS attacks ad hoc networks wireless networks security junk data packets Computer Sciences Management Information Systems |
spellingShingle |
packet injection source authentication secure forwarding denial of service DoS attacks ad hoc networks wireless networks security junk data packets Computer Sciences Management Information Systems GU, Qijun LIU, Peng CHU, Chao-Hsien ZHU, Sencun Defense Against Packet Injection in Ad Hoc Networks |
description |
Wireless ad hoc networks have very limited network resources and are thus susceptible to attacks that focus on resource exhaustion, such as the injection of junk packets. These attacks cause serious denial-of-service via wireless channel contention and network congestion. Although ad hoc network security has been extensively studied, most previous work focuses on secure routing, but cannot prevent attackers from injecting a large number of junk data packets into a route that has been established. We propose an on-demand hop-by-hop source authentication protocol, namely Source Authentication Forwarding (SAF), to defend against this type of packet injection attacks. The protocol can either immediately filter out injected junk packets with very high probability or expose the true identity of an injector. Unlike other forwarding defences, this protocol is designed to fit in the unreliable environment of ad hoc networks and incurs lightweight overhead in communication and computation. |
format |
text |
author |
GU, Qijun LIU, Peng CHU, Chao-Hsien ZHU, Sencun |
author_facet |
GU, Qijun LIU, Peng CHU, Chao-Hsien ZHU, Sencun |
author_sort |
GU, Qijun |
title |
Defense Against Packet Injection in Ad Hoc Networks |
title_short |
Defense Against Packet Injection in Ad Hoc Networks |
title_full |
Defense Against Packet Injection in Ad Hoc Networks |
title_fullStr |
Defense Against Packet Injection in Ad Hoc Networks |
title_full_unstemmed |
Defense Against Packet Injection in Ad Hoc Networks |
title_sort |
defense against packet injection in ad hoc networks |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2007 |
url |
https://ink.library.smu.edu.sg/sis_research/1785 http://dx.doi.org/10.1504/IJSN.2007.012832 |
_version_ |
1770571497824321536 |