On the analysis of identity delegation attacks

Issa M. Khalil, Abdallah Khreishah

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Identity delegation is a sever attack that can be easily launched against multihop wireless ad hoc and sensor networks. Its severity lies in its capability to evade detection by even the-state-of-the-art intrusion detection techniques such as the neighbor monitoring based mechanisms. Through identity delegation, an adversary can drop packets, evade detection, and frame innocent nodes of dropping the traffic. In a previous work, we proposed a mechanism called Sadec to mitigate identity delegation attacks. In this paper, we provide a thorough investigation of Sadec and compare it with the state-of-the-art mitigation technique dubbed basic local monitoring (BLM). Our analysis which is validated by ns-2 simulation scenarios show that BLM fails to efficiently mitigate packet drop through identity delegation while Sadec successfully mitigates it in addition to considerably reducing the framing incidents of legitimate nodes.

Original languageEnglish (US)
Title of host publication2012 International Conference on Computing, Networking and Communications, ICNC'12
Pages990-994
Number of pages5
DOIs
StatePublished - Apr 24 2012
Externally publishedYes
Event2012 International Conference on Computing, Networking and Communications, ICNC'12 - Maui, HI, United States
Duration: Jan 30 2012Feb 2 2012

Publication series

Name2012 International Conference on Computing, Networking and Communications, ICNC'12

Other

Other2012 International Conference on Computing, Networking and Communications, ICNC'12
CountryUnited States
CityMaui, HI
Period1/30/122/2/12

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Keywords

  • Local monitoring
  • identity delegation
  • multi-hop wireless networks
  • packet dropping

Fingerprint Dive into the research topics of 'On the analysis of identity delegation attacks'. Together they form a unique fingerprint.

Cite this