DocumentCode :
123780
Title :
Analyzing the ACK Counterfeiting Attack in Delay and Disruption Tolerant Networks
Author :
Naves, Juliano F. ; Monteiro Moraes, Igor
Author_Institution :
Laboratοrio MIdiaCom Inst. de Computaccαo, Univ. Fed. Fluminense Niterοi, Niteroi, Brazil
fYear :
2014
fDate :
5-9 May 2014
Firstpage :
52
Lastpage :
59
Abstract :
The routing protocols proposed for Delay and Disruption Tolerant Networks (DTNs) often employ acknowledgements. The goal is to increase the available space in buffers and also to avoid messages from being dropped unnecessarily due to buffer overflow. Protocols that employ such technique, however, are prone to suffer with from the acknowledgement counterfeiting attack. In this attack, malicious nodes counterfeit acknowledgements in order to force legitimate nodes to drop messages that are not already delivered to destination. Thus, the network performance is degraded. In this work, we analyze a countermeasure for this attack, in which nodes ignore acknowledgements for messages that were not previously received by this node. Three real mobility traces and a well-known mobility model are used in simulations and results show that when approximately 12% of the nodes in the network are malicious, the message delivery rate decreases up to 61 percentage points.
Keywords :
computer network security; delay tolerant networks; routing protocols; ACK counterfeiting attack analysis; acknowledgement counterfeiting attack; buffer overflow; delay tolerant networks; disruption tolerant networks; legitimate nodes; mobility model; mobility traces; protocols; routing protocols; Counterfeiting; Delays; Force; IP networks; Routing protocols; ACK counterfeiting attack; DTNs; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Networks and Distributed Systems (SBRC), 2014 Brazilian Symposium on
Conference_Location :
Florianopolis
Type :
conf
DOI :
10.1109/SBRC.2014.7
Filename :
6927119
Link To Document :
بازگشت