TOGBAD-LQ - Using Challenge-Response to Detect Fake Link Qualities
نویسندگان
چکیده
The usage of link quality based routing metrics significantly improves the quality of the chosen paths and by that the performance of the network. But, attackers may try to exploit link qualities for their purposes. Especially in tactical multi-hop networks, routing may fall prey to an attacker. Such routing attacks are a serious threat to communication. TOGBAD is a centralised approach, using topology graphs to detect routing attacks. In this paper, we enhance TOGBAD with the capability to detect fake link qualities. We use a Challenge/Response method to estimate the link qualities in the network. Based on this, we perform plausibility checks for the link qualities propagated by the nodes in the network. Furthermore, we study the impact of attackers propagating fake link qualities and present simulation results showing TOGBAD’s detection rate. Digital Object Identifier 10.4230/OASIcs.KiVS.2011.85
منابع مشابه
Wormhole Detection using Topology Graph based Anomaly Detection (TOGBAD)
Routing Attacks are a serious threat to communication in tactical MANETs. TOGBAD is a centralised approach, using topology graphs to detect such attacks. In this paper, we present TOGBAD’s newly added wormhole detection capability. It is an adaptation of a wormhole detection method developed by Hu et al. This method is based on nodes’ positions. We adapted it to the specific properties of tacti...
متن کاملThe Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry
Extant research has focused on the detection of fake reviews on online review platforms, motivated by the well-documented impact of customer reviews on the users’ purchase decisions. The problem is typically approached from the perspective of protecting the credibility of review platforms, as well as the reputation and revenue of the reviewed firms. However, there is little examination of the v...
متن کاملFake Biometric System For Fingerprint, Iris, and face using QDA and SIFT
Security is the major concern for today’s scenario. A high level industry uses passwords like thumb, face, voice, iris, etc. So many security systems are available, but not reliable. The biometric details are very useful and essential one of the developing security world, but the biometric details are made fake by the hackers. There are so many methods used to authentication the biometric detai...
متن کاملDetecting Fake Escrow Websites using Rich Fraud Cues and Kernel Based Methods
The ability to automatically detect fraudulent escrow websites is important in order to alleviate online auction fraud. Despite research on related topics, fake escrow website categorization has received little attention. In this study we evaluated the effectiveness of various features and techniques for detecting fake escrow websites. Our analysis included a rich set of features extracted from...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011