4.5 Article

Network wormhole attacks without a traditional wormhole

期刊

AD HOC NETWORKS
卷 151, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.adhoc.2023.103286

关键词

Wormhole attack; Ad-hoc networks; Betweenness centrality

向作者/读者索取更多资源

This research proposes a method to maximize the profit of the wormhole attack and challenges the assumptions of the existing attack protocol. Simulating different combinations of network nodes and edges, it shows the effectiveness of an alternative attack method that does not require additional virtual links and decreases the chances of being detected by intrusion detection systems.
A prudent attacker tries to maximize profits during an attack, taking into account the investment cost for carrying out the attack; a cost which always exists. This includes the effort of information gathering, the energy and work needed to develop the attack, the risk of being exposed etc. The wormhole attack, in which a non-existent path is augmented to the network coaxing naive nodes to route traffic through the attackers, is accepted as one of the most destructive attacks in ad-hoc networks (e.g. manets, iot, wsn, uavs etc.). This research proposes a method to maximize the profit of the attack and challenges the axiomatic assumption of the wormhole attack protocol. We show that up to a specific point, there is a simpler alternative to the attack that does not require the creation of an additional fictitious link; yet, achieves optimal attack coverage. Simulating multiple network node/edge combinations in ns3, demonstrates how the benefit of every additional dedicated wormhole link is actually small and diminishes as link density increases. Our alternative, based on centrality measures, decreases the chance of being detected by ids/ips as no active topology manipulation is taking place.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据