The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Dalam kajian ini, kami menganggap serangan mesej palsu dalam rangkaian ad hoc mudah alih yang jarang, di mana nod diasingkan secara kronik. Dalam rangkaian ini, mesej dihantar ke nod destinasi mereka menggunakan penghalaan simpan-bawa ke hadapan, di mana ia disampaikan oleh beberapa nod. Oleh itu, apabila nod mempunyai mesej dalam penimbalnya, ia boleh memalsukan mesej dengan mudah. Apabila nod berniat jahat wujud dalam rangkaian, mereka mengubah mesej untuk mencipta mesej palsu, dan kemudian mereka melancarkan serangan mesej palsu, iaitu, mesej palsu tersebar melalui rangkaian. Untuk menganalisis kesan negatif serangan mesej palsu, kami memodelkan sistem dinamik tanpa tindakan balas serangan menggunakan rantai Markov, dan kemudian memformalkan beberapa metrik prestasi (iaitu, kebarangkalian penghantaran, min kelewatan penghantaran dan min bilangan mesej yang dimajukan). Analisis ini berguna untuk mereka bentuk tindakan balas. Selain itu, kami mempertimbangkan langkah balas berasaskan cincang terhadap serangan mesej palsu menggunakan cincang mesej. Apabila nod yang mempunyai mesej dan cincangnya menemui nod lain, ia berkemungkinan memajukan hanya satu daripadanya ke nod yang ditemui. Dengan melakukan ini, mesej dan nilai cincang boleh dihantar ke nod destinasi melalui nod geganti yang berbeza. Oleh itu, walaupun nod destinasi menerima mesej palsu, ia boleh mengesahkan kesahihan mesej yang diterima. Melalui eksperimen simulasi, kami menilai keberkesanan tindakan balas berasaskan hash.
Yuki SHIMIZU
Doshisha University
Tomotaka KIMURA
Doshisha University
Jun CHENG
Doshisha University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Yuki SHIMIZU, Tomotaka KIMURA, Jun CHENG, "Performance Evaluation of a Hash-Based Countermeasure against Fake Message Attacks in Sparse Mobile Ad Hoc Networks" in IEICE TRANSACTIONS on Communications,
vol. E105-B, no. 7, pp. 833-847, July 2022, doi: 10.1587/transcom.2021EBP3103.
Abstract: In this study, we consider fake message attacks in sparse mobile ad hoc networks, in which nodes are chronically isolated. In these networks, messages are delivered to their destination nodes using store-carry-forward routing, where they are relayed by some nodes. Therefore, when a node has messages in its buffer, it can falsify the messages easily. When malicious nodes exist in the network, they alter messages to create fake messages, and then they launch fake message attacks, that is, the fake messages are spread over the network. To analyze the negative effects of a fake message attack, we model the system dynamics without attack countermeasures using a Markov chain, and then formalize some performance metrics (i.e., the delivery probability, mean delivery delay, and mean number of forwarded messages). This analysis is useful for designing countermeasures. Moreover, we consider a hash-based countermeasure against fake message attacks using a hash of the message. Whenever a node that has a message and its hash encounters another node, it probabilistically forwards only one of them to the encountered node. By doing this, the message and the hash value can be delivered to the destination node via different relay nodes. Therefore, even if the destination node receives a fake message, it can verify the legitimacy of the received message. Through simulation experiments, we evaluate the effectiveness of the hash-based countermeasure.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.2021EBP3103/_p
Salinan
@ARTICLE{e105-b_7_833,
author={Yuki SHIMIZU, Tomotaka KIMURA, Jun CHENG, },
journal={IEICE TRANSACTIONS on Communications},
title={Performance Evaluation of a Hash-Based Countermeasure against Fake Message Attacks in Sparse Mobile Ad Hoc Networks},
year={2022},
volume={E105-B},
number={7},
pages={833-847},
abstract={In this study, we consider fake message attacks in sparse mobile ad hoc networks, in which nodes are chronically isolated. In these networks, messages are delivered to their destination nodes using store-carry-forward routing, where they are relayed by some nodes. Therefore, when a node has messages in its buffer, it can falsify the messages easily. When malicious nodes exist in the network, they alter messages to create fake messages, and then they launch fake message attacks, that is, the fake messages are spread over the network. To analyze the negative effects of a fake message attack, we model the system dynamics without attack countermeasures using a Markov chain, and then formalize some performance metrics (i.e., the delivery probability, mean delivery delay, and mean number of forwarded messages). This analysis is useful for designing countermeasures. Moreover, we consider a hash-based countermeasure against fake message attacks using a hash of the message. Whenever a node that has a message and its hash encounters another node, it probabilistically forwards only one of them to the encountered node. By doing this, the message and the hash value can be delivered to the destination node via different relay nodes. Therefore, even if the destination node receives a fake message, it can verify the legitimacy of the received message. Through simulation experiments, we evaluate the effectiveness of the hash-based countermeasure.},
keywords={},
doi={10.1587/transcom.2021EBP3103},
ISSN={1745-1345},
month={July},}
Salinan
TY - JOUR
TI - Performance Evaluation of a Hash-Based Countermeasure against Fake Message Attacks in Sparse Mobile Ad Hoc Networks
T2 - IEICE TRANSACTIONS on Communications
SP - 833
EP - 847
AU - Yuki SHIMIZU
AU - Tomotaka KIMURA
AU - Jun CHENG
PY - 2022
DO - 10.1587/transcom.2021EBP3103
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E105-B
IS - 7
JA - IEICE TRANSACTIONS on Communications
Y1 - July 2022
AB - In this study, we consider fake message attacks in sparse mobile ad hoc networks, in which nodes are chronically isolated. In these networks, messages are delivered to their destination nodes using store-carry-forward routing, where they are relayed by some nodes. Therefore, when a node has messages in its buffer, it can falsify the messages easily. When malicious nodes exist in the network, they alter messages to create fake messages, and then they launch fake message attacks, that is, the fake messages are spread over the network. To analyze the negative effects of a fake message attack, we model the system dynamics without attack countermeasures using a Markov chain, and then formalize some performance metrics (i.e., the delivery probability, mean delivery delay, and mean number of forwarded messages). This analysis is useful for designing countermeasures. Moreover, we consider a hash-based countermeasure against fake message attacks using a hash of the message. Whenever a node that has a message and its hash encounters another node, it probabilistically forwards only one of them to the encountered node. By doing this, the message and the hash value can be delivered to the destination node via different relay nodes. Therefore, even if the destination node receives a fake message, it can verify the legitimacy of the received message. Through simulation experiments, we evaluate the effectiveness of the hash-based countermeasure.
ER -