{"title":"一种减轻无线自组织网络中持久数据包重排序攻击的加密散列解决方案","authors":"P. Raju, K. Shet","doi":"10.1109/ICCS.2012.83","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new scheme for mitigating the persistent packet reordering attack. This attack mainly makes use of the end to end congestion control mechanism of TCP. The proposed scheme uses symmetric key cryptography and modified SHA-1 (mSHA-1) hash function for verifying packet reordering. This is implemented with AOMDV routing protocol using NS-2 network simulator. The proposed solution blocks the attack after its detection. The efficiency of the proposed scheme is evaluated on different performance metrics like congestion window and TCP Good put as the attack mainly targets the congestion control mechanism of TCP.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Cryptographic Hashing Solution for Mitigating Persistent Packet Reordering Attack in Wireless Ad Hoc Networks\",\"authors\":\"P. Raju, K. Shet\",\"doi\":\"10.1109/ICCS.2012.83\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a new scheme for mitigating the persistent packet reordering attack. This attack mainly makes use of the end to end congestion control mechanism of TCP. The proposed scheme uses symmetric key cryptography and modified SHA-1 (mSHA-1) hash function for verifying packet reordering. This is implemented with AOMDV routing protocol using NS-2 network simulator. The proposed solution blocks the attack after its detection. The efficiency of the proposed scheme is evaluated on different performance metrics like congestion window and TCP Good put as the attack mainly targets the congestion control mechanism of TCP.\",\"PeriodicalId\":429916,\"journal\":{\"name\":\"2012 International Conference on Computing Sciences\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-09-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Computing Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCS.2012.83\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Computing Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS.2012.83","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
在本文中,我们提出了一种新的方案来减轻持久数据包重排序攻击。这种攻击主要利用TCP的端到端拥塞控制机制。该方案使用对称密钥加密和改进的SHA-1 (mSHA-1)哈希函数来验证数据包的重排序。这是利用NS-2网络模拟器实现的AOMDV路由协议。该解决方案在检测到攻击后进行阻断。由于攻击主要针对TCP的拥塞控制机制,因此采用拥塞窗口和TCP Good put等不同的性能指标来评估该方案的效率。
A Cryptographic Hashing Solution for Mitigating Persistent Packet Reordering Attack in Wireless Ad Hoc Networks
In this paper, we propose a new scheme for mitigating the persistent packet reordering attack. This attack mainly makes use of the end to end congestion control mechanism of TCP. The proposed scheme uses symmetric key cryptography and modified SHA-1 (mSHA-1) hash function for verifying packet reordering. This is implemented with AOMDV routing protocol using NS-2 network simulator. The proposed solution blocks the attack after its detection. The efficiency of the proposed scheme is evaluated on different performance metrics like congestion window and TCP Good put as the attack mainly targets the congestion control mechanism of TCP.