认知无线网络中MAC-TCP跨层攻击及其防御

Dileep Nagireddygari, Johnson P. Thomas
{"title":"认知无线网络中MAC-TCP跨层攻击及其防御","authors":"Dileep Nagireddygari, Johnson P. Thomas","doi":"10.1145/2642687.2642700","DOIUrl":null,"url":null,"abstract":"Existing research on attacks and security issues in Cognitive Radio networks focus on individual network layers. In this paper, we identify a cross-layer attack, which we call the MAC-TCP Cross-layer attack. This attack is launched from the MAC layer as the point of attack but the final target is to degrade TCP layer end to end throughput of flows by exploiting the TCP congestion control mechanism in cognitive radio. The chances of the attacker being detected are low owing to the fact that the target layer is different from the layer where the attack is launched. An adversary launches an attack on the MAC layer causing large variations in Round Trip Time (RTT) resulting in a large drop in throughput of TCP flows (drop of around 40% from our simulation results) but has little effect on the MAC-layer throughput and hence is very difficult to detect. A defense for this attack is proposed using a deterministic key pre-distribution algorithm where the keys are pre-distributed to nodes. Simulation results show that the throughput is restored to its original levels using key pre-distribution.","PeriodicalId":369459,"journal":{"name":"Q2S and Security for Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"MAC-TCP cross-layer attack and its defense in cognitive radio networks\",\"authors\":\"Dileep Nagireddygari, Johnson P. Thomas\",\"doi\":\"10.1145/2642687.2642700\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Existing research on attacks and security issues in Cognitive Radio networks focus on individual network layers. In this paper, we identify a cross-layer attack, which we call the MAC-TCP Cross-layer attack. This attack is launched from the MAC layer as the point of attack but the final target is to degrade TCP layer end to end throughput of flows by exploiting the TCP congestion control mechanism in cognitive radio. The chances of the attacker being detected are low owing to the fact that the target layer is different from the layer where the attack is launched. An adversary launches an attack on the MAC layer causing large variations in Round Trip Time (RTT) resulting in a large drop in throughput of TCP flows (drop of around 40% from our simulation results) but has little effect on the MAC-layer throughput and hence is very difficult to detect. A defense for this attack is proposed using a deterministic key pre-distribution algorithm where the keys are pre-distributed to nodes. Simulation results show that the throughput is restored to its original levels using key pre-distribution.\",\"PeriodicalId\":369459,\"journal\":{\"name\":\"Q2S and Security for Wireless and Mobile Networks\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Q2S and Security for Wireless and Mobile Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2642687.2642700\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Q2S and Security for Wireless and Mobile Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2642687.2642700","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

现有的认知无线网络攻击和安全问题研究主要集中在单个网络层。在本文中,我们识别了一种跨层攻击,我们称之为MAC-TCP跨层攻击。这种攻击从MAC层作为攻击点,但最终目标是利用认知无线电中的TCP拥塞控制机制来降低TCP层流量的端到端吞吐量。由于目标层与发起攻击的层不同,攻击者被检测到的机会很低。攻击者在MAC层发起攻击,导致往返时间(RTT)的巨大变化,导致TCP流的吞吐量大幅下降(从我们的模拟结果下降约40%),但对MAC层吞吐量的影响很小,因此很难检测到。提出了一种针对这种攻击的防御方法,使用确定性密钥预分发算法,其中密钥预分发到节点。仿真结果表明,通过密钥预分配,可以将吞吐量恢复到原来的水平。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
MAC-TCP cross-layer attack and its defense in cognitive radio networks
Existing research on attacks and security issues in Cognitive Radio networks focus on individual network layers. In this paper, we identify a cross-layer attack, which we call the MAC-TCP Cross-layer attack. This attack is launched from the MAC layer as the point of attack but the final target is to degrade TCP layer end to end throughput of flows by exploiting the TCP congestion control mechanism in cognitive radio. The chances of the attacker being detected are low owing to the fact that the target layer is different from the layer where the attack is launched. An adversary launches an attack on the MAC layer causing large variations in Round Trip Time (RTT) resulting in a large drop in throughput of TCP flows (drop of around 40% from our simulation results) but has little effect on the MAC-layer throughput and hence is very difficult to detect. A defense for this attack is proposed using a deterministic key pre-distribution algorithm where the keys are pre-distributed to nodes. Simulation results show that the throughput is restored to its original levels using key pre-distribution.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信