CollusiveHijack: A New Route Hijacking Attack and Countermeasures in Opportunistic Networks

2019 IEEE Conference on Communications and Network Security (CNS)(2019)

引用 3|浏览57
暂无评分
摘要
In this paper, we first show that Hybrid Routing and Prophet protocols in Opportunistic Networks are vulnerable to the CollusiveHijack attack. In this attack, a malicious attacker, Eve, compromises a set of nodes and lies about their Inter Contact Times (ICTs). Eve claims that her nodes meet more frequently than in reality, with the goal of hijacking the routes of legitimate nodes. The CollusiveHijack enables Eve to launch more severe attacks like packet modification attack, traffic analysis attack, and incentive seeking attack. To identify the CollusiveHijack attack, we propose the Kolmogorov-Smirnov two-sample test to determine whether the statistical distribution of the packets' delays follows the derived distribution from the ICTs among the nodes. We propose two techniques to detect the CollusiveHijack attack: the Path Detection Technique (PDT) and the Hop Detection Technique (HDT), which trade off compatibility with the Bundle Security Protocol and the detection rate. We evaluated PDT and HDT through extensive simulations and a proof-of-concept system implementation. The results show that PDT and HDT are able to detect CollusiveHijack attacks with 80.0% and 99.4% detection rates, respectively (when Eve hijacks more than 60 packets) while maintaining a low false positive rate of 3.6%.
更多
查看译文
关键词
Opportunistic Networks,CollusiveHijack attack,malicious attacker,severe attacks,packet modification attack,traffic analysis attack,route hijacking attack,hybrid routing protocol,prophet protocol,inter contact times,path detection technique,hop detection technique,bundle security protocol,incentive seeking attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要