Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis

S. Aslam, A. Altaweel, I. Kamel
{"title":"Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and Analysis","authors":"S. Aslam, A. Altaweel, I. Kamel","doi":"10.1145/3590777.3590781","DOIUrl":null,"url":null,"abstract":"Wormhole attack has exposed-mode (internal attack with exposed attacker nodes identities) and hidden-mode (external attack with hidden attacker nodes identities). In exposed-mode, the pair-wise connected attacker nodes fool the legitimate nodes by using a hidden link to route packets and yield high packet delivery ratio. As the packets reach the wormhole nodes, attackers can initiate traffic analysis, packet dropping, and/or packet modification attacks. This paper studies and analyzes the impact of the exposed-mode of wormhole attack in Opportunistic Mobile Networks (OMNs) and the parameters affecting it. The impacts of the exposed-mode of wormhole attack are analyzed using the amount of extra routed packets the attacker nodes will obtain. The attack was launched by varying different parameters (i.e., number of wormhole nodes, attack frequency, and attack duration) that influence its intensity against four main routing protocols in OMNs (i.e., Prophet, Spray and Wait, Epidemic, and First Contact). The simulation experiments employed two widely-used mobility traces (real-world and synthetic) in OMNs and were analyzed in terms of the most vulnerable routing protocol and the most influential attack parameter. We concluded that attackers can smartly overthrow safe communications in OMNs using deep analysis of routing mechanisms and nodes density.","PeriodicalId":231403,"journal":{"name":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3590777.3590781","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Wormhole attack has exposed-mode (internal attack with exposed attacker nodes identities) and hidden-mode (external attack with hidden attacker nodes identities). In exposed-mode, the pair-wise connected attacker nodes fool the legitimate nodes by using a hidden link to route packets and yield high packet delivery ratio. As the packets reach the wormhole nodes, attackers can initiate traffic analysis, packet dropping, and/or packet modification attacks. This paper studies and analyzes the impact of the exposed-mode of wormhole attack in Opportunistic Mobile Networks (OMNs) and the parameters affecting it. The impacts of the exposed-mode of wormhole attack are analyzed using the amount of extra routed packets the attacker nodes will obtain. The attack was launched by varying different parameters (i.e., number of wormhole nodes, attack frequency, and attack duration) that influence its intensity against four main routing protocols in OMNs (i.e., Prophet, Spray and Wait, Epidemic, and First Contact). The simulation experiments employed two widely-used mobility traces (real-world and synthetic) in OMNs and were analyzed in terms of the most vulnerable routing protocol and the most influential attack parameter. We concluded that attackers can smartly overthrow safe communications in OMNs using deep analysis of routing mechanisms and nodes density.
机会主义移动网络中暴露模式的虫洞攻击:影响研究与分析
虫洞攻击有暴露模式(攻击者节点身份暴露的内部攻击)和隐藏模式(攻击者节点身份隐藏的外部攻击)。在“暴露”模式下,两两连接的攻击节点利用隐藏链路欺骗合法节点路由报文,获得较高的报文投递率。报文到达虫洞节点后,攻击者可以进行流量分析、丢包、修改报文等攻击。本文研究和分析了机会移动网络(OMNs)中虫洞攻击暴露模式的影响及其影响参数。利用攻击节点获得的额外路由数据包数量,分析了虫洞攻击暴露模式的影响。攻击是通过改变不同的参数(即虫洞节点数量、攻击频率和攻击持续时间)发起的,这些参数会影响其对omn中四个主要路由协议(即先知、喷雾和等待、流行病和第一次接触)的强度。仿真实验采用了omn中两种广泛使用的移动路径(真实和合成),并从最脆弱的路由协议和最具影响的攻击参数进行了分析。我们的结论是,攻击者可以通过对路由机制和节点密度的深入分析,巧妙地推翻omn中的安全通信。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信