Title :
Stealth attacks on ad-hoc wireless networks
Author :
Jakobsson, Markus ; Wetzel, Susanne ; Yener, Bülent
Author_Institution :
RSA Labs, Bedford, MA, USA
Abstract :
We study two classes of attacks that can be mounted by manipulation of routing information and exhaustive power consumption. Our attacks allow an attacker to partition a network, reduce its goodput, hi-jack and filter traffic from and to victim nodes, and thereby eavesdrop and perform traffic analysis. The methods described are "stealth attacks" in that they minimize the cost to and visibility of the attacker. We introduce the notion of reputation based control, and suggest that it can be used to augment existing routing protocols in order to immunize these against stealth attacks.
Keywords :
ad hoc networks; routing protocols; telecommunication control; telecommunication security; telecommunication traffic; ad-hoc wireless networks; filter traffic; routing information; routing protocols; stealth attacks; traffic analysis; Communication networks; Communication system traffic control; Computer crime; Computer science; Costs; Energy consumption; Filters; Mobile communication; Routing protocols; Wireless networks;
Conference_Titel :
Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th
Print_ISBN :
0-7803-7954-3
DOI :
10.1109/VETECF.2003.1285396