On the analysis of identity delegation attacks

Issa M. Khalil, Abdallah Khreishah

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    Identity delegation is a sever attack that can be easily launched against multihop wireless ad hoc and sensor networks. Its severity lies in its capability to evade detection by even the-state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes of dropping the traffic. In a previous work, we proposed a mechanism called Sadec to mitigate identity delegation attacks. In this paper, we provide a thorough investigation of Sadec and compare it with the state-of-the-art mitigation technique dubbed basic local monitoring (BLM). Our analysis which is validated by ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation while Sadec successfully mitigates it in addition to considerably reducing the framing incidents of legitimate nodes.

    Original languageEnglish
    Title of host publication2012 International Conference on Computing, Networking and Communications, ICNC'12
    Pages990-994
    Number of pages5
    DOIs
    Publication statusPublished - Apr 24 2012
    Event2012 International Conference on Computing, Networking and Communications, ICNC'12 - Maui, HI, United States
    Duration: Jan 30 2012Feb 2 2012

    Publication series

    Name2012 International Conference on Computing, Networking and Communications, ICNC'12

    Other

    Other2012 International Conference on Computing, Networking and Communications, ICNC'12
    Country/TerritoryUnited States
    CityMaui, HI
    Period1/30/122/2/12

    Keywords

    • Local monitoring
    • identity delegation
    • multi-hop wireless networks
    • packet dropping

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'On the analysis of identity delegation attacks'. Together they form a unique fingerprint.

    Cite this