Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures

نویسندگان

  • Yuanyuan Zhang
  • Marine Minier
چکیده

Network coding has attracted the attention of many researchers in security and cryptography. In this paper, a well know attack selective forwarding attack will be studied in network coding systems. While most of the works have been dedicated to the countermeasure against pollution attacks where an attacker modifies intermediate packets, only few works concern selective forwarding attacks on data or acknowledgment (ACK) packets, those last ones are required in network coding. However, selective forwarding attacks stay a real threat in resource constraint networks such as wireless sensor networks, especially when selective forwarding attacks target the acknowledgment (ACK) messages, referred to as flooding attack. In the latter model, an adversary can easily create congestion in the network and exhaust all the resources available. The degradation of the QoS (delay,energy) goes beyond the capabilities of cryptographic solutions. In this paper, we first analyze by simulation the effects of selective forwarding attacks both on data flows and on ACK flows. We then investigate the security capabilities of multipath acknowledgment in more details than in our original proposal [1].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different r...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

Survey: Detection Schemes Against Selective Forwarding Attack

Wireless sensor network becomes increasingly popular with the development in technology. It can provide enormous amount of services for the benefit of mankind. But due to its limitations in memory and other resources it is very much prone security attacks, selective forwarding attack is one that security attacks which can affect the whole sensor network communication. The variety of defense sch...

متن کامل

Network Coding Based Security for Routing Attacks in WRN: Frechet Interference and Rayleigh Outage Evaluation

We present a network coding security method capable of detecting several routing attacks in wireless reconfigurable networks. Routing security attacks include selective forwarding, black holes, and wormholes. The proposed method performs linear network coding over intermediate nodes composing a given route, not only to distribute content, but also to provide data confidentiality by cooperation ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal Comp. Netw. and Communic.

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012