Computer Science ›› 2018, Vol. 45 ›› Issue (12): 104-110.doi: 10.11896/j.issn.1002-137X.2018.12.016

• Information Security • Previous Articles     Next Articles

Link Correlation Spoofing Attack and Detection Mechanism

XU Jia-jia1,2, BAI Guang-wei1, SHEN Hang1,3   

  1. (College of Computer Science and Technology,Nanjing Tech University,Nanjing 211816,China)1
    (State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,China)2
    (National Engineering Research Center for Communication and Network Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China)3
  • Received:2017-09-11 Online:2018-12-15 Published:2019-02-25

Abstract: Recent studies highlight the existence of link correlation of adjacent wireless links,and this phenomenon has shown significant impact on the performance of various network protocols.The efficiency of these existing link-correlated protocols heavily relies on the accuracy of link correlation measurement.However,analysis shows that due to its features of mobility and RF communication,wireless networks is vulnerable to various threats and attacks.This paper first proposed a spoofing attack mechanism about link correlation aware protocols.When the source node broadcasts packets,some or even all of the corresponding receivers maliciously revise their packet reception bitmaps to tamper link correlation metric,thus degrading protocol performance.Against the attack,a Watchdog-based detection mechanism was proposed to capture a node’s behavior with objective of inferring the real packet reception bitmaps.The simulation results show that this spoofing attack increases the retransmission counts,and degrades the performance of communication protocol,while the propoced detection mechanism can defend the spoofing attack effectively.

Key words: Detection mechanism, Link correlation, Spoofing attack, Wireless network

CLC Number: 

  • TP393
[1]SONG M K,WANG S,HE T.Exploiting causes and effects of wireless link correlation for better performance [C]∥Computer Communications.IEEE,2015:379-387.
[2]WANG S,KIM S M,LIU Y H,et al.CorLayer:A transparent link correlation layer for energy efficient broadcast [J].In MobiCom,2013,23(6):1970-1983.
[3]SINGH G.A Survey of Multicast Routing Protocols inMANETS[C]∥International Conference on Futuristic Trends in Engineering & Management.2014.
[4]WANG S,BASALAMAH A,SONG M K,et al.Link-Correlation-Aware Opportunistic Routing in Wireless Networks [J].IEEE Transactions on Wireless Communications,2015,14(1):47-56.
[5]WANG H,LIU Y,XU S.An Opportunistic Routing ProtocolBased on Link Correlation for Wireless Mesh Networks [M]∥Wireless Communications,Networking and Applications.Springer India,2016.
[6]SALEHI M,BOUKERCHE A,DAREHSHOORZADEH A.Modeling and Performance Evaluation of Security Attacks on Opportunistic Routing Protocols for Multihop Wireless Networks [J].Ad Hoc Networks,2016,50(C):88-101.
[7]LI L,RAMJEE R,BUDDHIKOT M,et al.Network Coding-Based Broadcast in Mobile Ad-hoc Networks[J].Proceedings -IEEE INFOCOM,2007,5(8):1739-1747.
[8]WANG S,KIM S M,YIN Z,et al.Encode When Necessary:Correlated Network Coding Under Unreliable Wireless Links[J].Acm Transactions on Sensor Networks,2017,13(1):1-22.
[9]ZHU T,ZHONG Z,HE T,et al.Exploring link correlation for efficient flooding in wireless sensor networks[C]∥Proceedings of the First USENIX/ACM Symposium on Network Systems Design and Implementation (NSDI).2010.
[10]WANG S,BASALAMAH A,SONG M K,et al.A Unified Metric for Correlated Diversity in Wireless Networks [J].IEEE Transactions on Wireless Communications,2016,15(9):6215-6227.
[11]SRINIVASAN K,JAIN M,CHOI J I,et al.The κ-factor:Inferring protocol performance using inter-link reception correlation[C]∥Proceedings of ACM MOBICOM.2010.
[12]ZHAO Z,DONG W,BU J,et al.Exploiting link correlation for core-based dissemination in wireless sensor networks [C]∥Eleventh IEEE International Conference on Sensing,Communication,and Networking.IEEE,2014:372-380.
[13]TIAN B.Attack Detection and Defense Technologies in Wireless Sensor Networks[D].Beijing:Beijing University of Posts and Telecommunications,2012.(in Chinese)
田斌.无线传感器网络中攻击检测和防御技术研究[D].北京:北京邮电大学,2012.
[14]CHO Y,QU G.Detection and Prevention of Selective Forwar-ding-Based Denial-of-Service Attacks in WSNs [J].International Journal of Distributed Sensor Networks,2013,2013(3):264-273.
[15]BORA S,SINGH S,MOHAMAD AS,et al.Watchdog:A Study on Examining and Eliminating Misbehaviour[J].International Journal of Computer Applications,2014,87(3):1-3.
[16]AGRAWAL S,JAIN S,SHARMA S.A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks [J].2011,4(1):41-48.
[17]MACKE J H,BERENS P,ECKER A S,et al.Generating spike trains with specified correlation coefficients [J].Neural Computation,2009,21(2):397-423.
[18]HIGHAM N J.Computing the nearest correlation matrix-aproblem from finance [J].Ima Journal of Numerical Analysis,2002,22(3):329-343.
[19]HEINZELMAN W B,CHANDRAKASAN A P,BALAKRISHNAN H.An Application Specific Protocol Architecture for Wireless Microsensor Networks[C]∥IEEE Transactions on Wireless Communication.2002:660-670.
[1] ZHAO Luo-cheng, QU Zhi-hao, XIE Zai-peng. Study on Communication Optimization of Federated Learning in Multi-layer Wireless Edge Environment [J]. Computer Science, 2022, 49(3): 39-45.
[2] GUO Yi-shan, LIU Man-dan. Anomaly Detection Based on Spatial-temporal Trajectory Data [J]. Computer Science, 2021, 48(6A): 213-219.
[3] HE Quan-qi, YU Fei-hong. Review of Low Power Architecture for Wireless Network Cameras [J]. Computer Science, 2021, 48(6A): 369-373.
[4] PENG Da-chuan, YANG Xi-min, TANG Wan, ZHANG Xiao, FAN Lei. Dual-NIC Mutual Backup Scheme for Access Point Handoff in Software Defined Wireless Networks [J]. Computer Science, 2021, 48(6A): 427-431.
[5] QIAN Guang-ming, YI Chao. Real Time Wireless Connection Scheme for Multi-nodes [J]. Computer Science, 2021, 48(11A): 446-451.
[6] JI Xiao-xiang, SHEN Hang, BAI Guang-wei. Non-orthogonal Multiple Access Enabled Scalable Video Multicast in HetNets [J]. Computer Science, 2021, 48(11): 356-362.
[7] CAO Su-e, YANG Ze-min. Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine [J]. Computer Science, 2020, 47(8): 319-322.
[8] TAO Yang,JI Rui-juan,YANG Li,WANG Jin. Study on Dynamic Priority Admission Control Algorithm in Heterogeneous Wireless Networks [J]. Computer Science, 2020, 47(3): 242-247.
[9] LIANG Tao, WANG Tong-xiang, LIU Jian-wei, YANG Jing. Modeling of Jamming Attack and Performance Analysis in Multi-hop Wireless Network [J]. Computer Science, 2019, 46(11A): 414-416.
[10] GUO Bin, YU Dan-dan, LU Wei, HUANG Ming-he, ZENG Ya-lin. Selective Network Coding Strategy Based on Packet Loss Prediction [J]. Computer Science, 2019, 46(11A): 399-404.
[11] YAO Xin-wei, ZHANG Meng-na, WANG Wan-liang, YANG Shuang-hua. Optimal Energy Allocation Algorithm with Energy Harvesting and Hybrid Energy Storage for Microscale Wireless Networks [J]. Computer Science, 2018, 45(8): 75-79.
[12] HAN Xiu-ping, WANG Zhi, PEI Dan. Study on Wi-Fi Fingerprint Anonymization for Users in Wireless Networks [J]. Computer Science, 2018, 45(8): 7-12.
[13] XU Wen-hao, SHEN Hang and BAI Guang-wei. Link Burstiness-aware Opportunistic Routing Protocol in Wireless Networks [J]. Computer Science, 2018, 45(5): 83-88.
[14] HUANG Rong-xi, WANG Nao, XIE Tian-xiao, WANG Gao-cai. Study on Channel-aware Expected Energy Consumption Minimization Strategy in Wireless Networks [J]. Computer Science, 2018, 45(10): 130-137.
[15] GUO Ping, FU De-sheng, ZHU Jie-zhong and CHENG Ya-ping. Lightweight and Shifted CA Architecture for MANET [J]. Computer Science, 2017, 44(3): 145-149.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!