Title :
On the analysis of identity delegation attacks
Author :
Khalil, Issa M. ; Khreishah, Abdallah
Author_Institution :
Coll. of Inf. Technol., United Arab Emirates Univ., United Arab Emirates
fDate :
Jan. 30 2012-Feb. 2 2012
Abstract :
Identity delegation is a sever attack that can be easily launched against multihop wireless ad hoc and sensor networks. Its severity lies in its capability to evade detection by even the-state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes of dropping the traffic. In a previous work, we proposed a mechanism called Sadec to mitigate identity delegation attacks. In this paper, we provide a thorough investigation of Sadec and compare it with the state-of-the-art mitigation technique dubbed basic local monitoring (BLM). Our analysis which is validated by ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation while Sadec successfully mitigates it in addition to considerably reducing the framing incidents of legitimate nodes.
Keywords :
ad hoc networks; telecommunication security; wireless sensor networks; SADEC; basic local monitoring; identity delegation attack analysis; innocent nodes framing; multihop wireless ad hoc networks; neighbor monitoring based mechanisms; ns-2 simulation; packet drop mitigation; state-of-the-art intrusion detection techniques; state-of-the-art mitigation technique; traffic dropping; wireless sensor networks; Mobile ad hoc networks; Mobile computing; Monitoring; Protocols; Spread spectrum communication; Wireless sensor networks; Local monitoring; identity delegation; multi-hop wireless networks; packet dropping;
Conference_Titel :
Computing, Networking and Communications (ICNC), 2012 International Conference on
Conference_Location :
Maui, HI
Print_ISBN :
978-1-4673-0008-7
Electronic_ISBN :
978-1-4673-0723-9
DOI :
10.1109/ICCNC.2012.6167574