Neighbor contamination to achieve complete bottleneck control

Nadav Schweitzer, Ariel Stulman, Asaf Shabtai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Black-holes, gray-holes and, wormholes, are devastating to the correct operation of any network. These attacks (among others) are based on the premise that packets will travel through compromised nodes, and methods exist to coax routing into these traps. Detection of these attacks are mainly centered around finding the subversion in action. In networks, bottleneck nodes-those that sit on many potential routes between sender and receiver-are an optimal location for compromise. Finding naturally occurring path bottlenecks, however, does not entitle network subversion, and as such are more difficult to detect. The dynamic nature of mobile ad-hoc networks (MANETs) causes ubiquitous routing algorithms to be even more susceptible to this class of attacks. Finding perceived bottlenecks in an OLSR based MANET, is able to capture between 50%-75% of data. In this paper we propose a method of subtly expanding perceived bottlenecks into complete bottlenecks, raising capture rate up to 99%; albeit, at high cost. We further tune the method to reduce cost, and measure the corresponding capture rate.

Original languageEnglish
Title of host publicationMSWiM 2016 - Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
PublisherAssociation for Computing Machinery, Inc
Pages247-253
Number of pages7
ISBN (Electronic)9781450345026
DOIs
StatePublished - 13 Nov 2016
Event19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2016 - Malta, Malta
Duration: 13 Nov 201617 Nov 2016

Publication series

NameMSWiM 2016 - Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems

Conference

Conference19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2016
Country/TerritoryMalta
CityMalta
Period13/11/1617/11/16

Keywords

  • Internet of things
  • Manet
  • Mobile
  • Network bottlenecks
  • Wormhole

Fingerprint

Dive into the research topics of 'Neighbor contamination to achieve complete bottleneck control'. Together they form a unique fingerprint.

Cite this