...
首页> 外文期刊>Computer networks >CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
【24h】

CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks

机译:CTAC:控制移动无线网络中的流量隧道攻击的对策

获取原文
获取原文并翻译 | 示例
           

摘要

Multihop wireless ad hoc and sensor networks open the door for great networking opportunities especially in scenarios where it is infeasible or expensive to deploy significant networking infrastructure. However, the open communication media and the lack of networking infrastructure make these networks vulnerable to a wide range of security attacks. A particularly devastating attack is the control traffic tunneling attack, where a malicious node records control traffic at one location and tunnels it to a colluding node, possibly far away, which replays it locally. One of the control traffic attacks' incarnations is the wormhole attack that can be used to prevent route establishment by preventing nodes from discovering legitimate routes that are more than two hops away. These attacks have been addressed by many researchers, however, most of the presented work is either limited to static scenarios, require expensive hardware or suffer from high overhead and performance degradation. In this paper, we present a scalable countermeasure for the control traffic tunneling attack, called CTAC, which alleviates these drawbacks and efficiently mitigates the attack in both static and mobile networks. CTAC uses trusted nodes called cluster heads (CH) for global tracking of node locations and profile keeping. Local monitoring is used to detect and isolate malicious nodes locally. Additionally, when sufficient suspicion builds up at a CH, it enforces a global isolation of the malicious node from the whole network. The performance gain, the relatively low overhead, and the positive impact of CTAC on the data traffic fidelity are brought out through analysis and extensive simulation using ns-2. The results show that CTAC achieves higher detection ratio and faster isolation time while considerably decreases the overhead energy and the end-to-end delay compared to the state-of-the art schemes.
机译:多跳无线ad hoc和传感器网络为巨大的联网机会打开了大门,尤其是在部署重要的网络基础架构不可行或成本很高的情况下。但是,开放的通信媒体和缺乏网络基础结构使这些网络容易受到广泛的安全攻击。一种特别具有破坏性的攻击是控制流量隧道攻击,其中恶意节点将控制流量记录在一个位置,并将其通过隧道传输到可能很远的共谋节点,然后在本地重播它。控制流量攻击的化身之一是虫孔攻击,可通过阻止节点发现距离两跳以上的合法路由来阻止路由建立。这些攻击已被许多研究人员解决,但是,目前提出的大多数工作要么限于静态方案,要么需要昂贵的硬件,要么遭受高额开销和性能下降的困扰。在本文中,我们提出了控制流量隧道攻击的可扩展对策,称为CTAC,可以缓解这些缺陷并有效缓解静态和移动网络中的攻击。 CTAC使用称为簇头(CH)的受信任节点来全局跟踪节点位置和保持配置文件。本地监视用于在本地检测和隔离恶意节点。另外,当在CH上建立起足够的怀疑时,它将强制将恶意节点与整个网络进行全局隔离。通过使用ns-2进行分析和广泛仿真,可以得出性能提升,相对较低的开销以及CTAC对数据流量保真度的积极影响。结果表明,与最新方案相比,CTAC可以实现更高的检测率和更快的隔离时间,同时显着降低开销能量和端到端延迟。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号