Brian Neil Levine  
 
1 result where citekey includes Burgess:2007.
[All entries] This page as [Text] or [Bibtex]

  • @inproceedings{Burgess:2007,
    Abstract = {Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN may attempt to delay or destroy data in transit to its destination. Such attacks include dropping data, flooding the network with extra messages, corrupting routing tables, and counterfeiting network acknowledgments. Many existing methods for securing routing protocols require authentication supported by mechanisms such as a public key infrastructure, which is difficult to deploy and operate in a DTN, where connectivity is sporadic. Furthermore, the complexity of such mechanisms may dissuade node participation so strongly that potential attacker impacts are dwarfed by the loss of contributing participants. In this paper, we use connectivity traces from our UMass DieselNet project and the Haggle project to quantify routing attack effectiveness on a DTN that lacks security. We introduce plausible attackers and attack modalities and provide complexity results for the strongest of attackers. We show that the same routing with packet replication used to provide robustness in the face of unpredictable mobility allows the network to gracefully survive attacks. In the case of the most effective attack, acknowledgment counterfeiting, we show a straightforward defense that uses cryptographic hashes but not a central authority. We conclude that disruption-tolerant networks are extremely robust to attack; in our trace-driven evaluations, an attacker that has compromised 30% of all nodes reduces delivery rates from 70% to 55%, and to 20% with knowledge of future events. By comparison, contemporaneously connected networks are significantly more fragile. },
    Address = {Montreal, Quebec, Canada},
    Author = {Burgess, John and Bissias, George and Corner, Mark D. and Levine, Brian Neil},
    Booktitle = {Proc. ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc)},
    Keywords = {DTN; wireless; security; routing; DOME},
    Month = {September},
    Pages = {61--70},
    Slides_Url = {http://forensics.umass.edu/pubs/mcorner/mobihoc07.ppt},
    Sponsors = {CNS-0133055, CNS-0519881, and CNS 0447877},
    Title = {{Surviving Attacks on Disruption-Tolerant Networks without Authentication}},
    Traces_Url = {http://traces.cs.umass.edu},
    Url = {http://forensics.umass.edu/pubs/burgess.mobihoc.2007.pdf},
    Year = {2007},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/burgess.mobihoc.2007.pdf}}

    [link][PDF]

 

Keywords

  • Wireless
  • Security
  • Peer-to-Peer
  • Multicast

  • sub-keywords:
  • Forensics
  • Privacy/Anonymity
  • DTNs
  • Routing
  • Gaming
  • Underwater
  • Sybil attack
  • Synthesis [about]
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • 2004
  • 2003
  • 2002
  • 2001
  • 2000
  • 1999
  • 1998
  • 1997
  • 1996