A Study of PPM-based Traceback in Sensor Networks

碩士 === 國立中正大學 === 通訊工程研究所 === 96 === With limited resource constraints, WSNs pose unique technical challenges: vulnerable to DoS/DDoS attacks that can exhaust rare available resources easily to prevent WSNs from performing their expected functions. To reconstruct the attacking path and to locate the...

Full description

Bibliographic Details
Main Authors: Guo-tan Liao, 廖國潭
Other Authors: Bo-chao Cheng
Format: Others
Language:en_US
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/65700652089448157143
id ndltd-TW-096CCU05650030
record_format oai_dc
spelling ndltd-TW-096CCU056500302016-05-04T04:25:44Z http://ndltd.ncl.edu.tw/handle/65700652089448157143 A Study of PPM-based Traceback in Sensor Networks 無線感測網路研究:針對機率封包標記之追溯攻擊機制 Guo-tan Liao 廖國潭 碩士 國立中正大學 通訊工程研究所 96 With limited resource constraints, WSNs pose unique technical challenges: vulnerable to DoS/DDoS attacks that can exhaust rare available resources easily to prevent WSNs from performing their expected functions. To reconstruct the attacking path and to locate the attacking source are challenging tasks in the traceback research areas. In conventional IP networks, probability packet marking (PPM) schemes are widely used for traceback. However, conventional PPM schemes are not enough to cater for the needs of quick and accurate traceback in WSNs due to high convergence time. In this paper, we propose a novel traceback scheme called Anti-Spoof PPM (ASP), which can identify the spoof and trace the attacking path under sensor network environment where spoofing exists. ASP is designed based on the edge sampling algorithm with five-label marking scheme and with a smart Making Probability Distribution Function (MPDF). The additional labels to edge sampling scheme, ‘former’ and ‘gullet’, are used to trace the attack path precisely and to identify multiple attackers and spoof via deriving spurious marks. Besides, we propose a novel traceback scheme called Fishbone Traceback (FBT) scheme, which can be deployed in hierarchical WSN environment. FBT is designed based on the two-layer labeling technique and MPDF. The use of two-layer FBT label is to derive the main branch (“spine path”) of the attacking path quickly, while the use of MPDF can greatly reduce the convergence time by integrating with a priori information of hierarchical WSN topology. The FBT path reconstruction procedure is able to rebuild the spine path (for inter-cluster traceback) via cluster head marking packets and to reforms the details of the micro fishbone path (for intra-cluster traceback) on-demand within a cluster. Both numerical analysis and simulation results show that our solution has better performance in terms of the shortest period of traceback convergence time. In particular, the proposed FBT also includes many salient features (such as the enhanced robustness of the traceback algorithm in case of multi-attack and reusable spine path), which enable FBT to be a practical solution to the traceback problem in hierarchical WSNs. Bo-chao Cheng 鄭伯炤 2008 學位論文 ; thesis 68 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立中正大學 === 通訊工程研究所 === 96 === With limited resource constraints, WSNs pose unique technical challenges: vulnerable to DoS/DDoS attacks that can exhaust rare available resources easily to prevent WSNs from performing their expected functions. To reconstruct the attacking path and to locate the attacking source are challenging tasks in the traceback research areas. In conventional IP networks, probability packet marking (PPM) schemes are widely used for traceback. However, conventional PPM schemes are not enough to cater for the needs of quick and accurate traceback in WSNs due to high convergence time. In this paper, we propose a novel traceback scheme called Anti-Spoof PPM (ASP), which can identify the spoof and trace the attacking path under sensor network environment where spoofing exists. ASP is designed based on the edge sampling algorithm with five-label marking scheme and with a smart Making Probability Distribution Function (MPDF). The additional labels to edge sampling scheme, ‘former’ and ‘gullet’, are used to trace the attack path precisely and to identify multiple attackers and spoof via deriving spurious marks. Besides, we propose a novel traceback scheme called Fishbone Traceback (FBT) scheme, which can be deployed in hierarchical WSN environment. FBT is designed based on the two-layer labeling technique and MPDF. The use of two-layer FBT label is to derive the main branch (“spine path”) of the attacking path quickly, while the use of MPDF can greatly reduce the convergence time by integrating with a priori information of hierarchical WSN topology. The FBT path reconstruction procedure is able to rebuild the spine path (for inter-cluster traceback) via cluster head marking packets and to reforms the details of the micro fishbone path (for intra-cluster traceback) on-demand within a cluster. Both numerical analysis and simulation results show that our solution has better performance in terms of the shortest period of traceback convergence time. In particular, the proposed FBT also includes many salient features (such as the enhanced robustness of the traceback algorithm in case of multi-attack and reusable spine path), which enable FBT to be a practical solution to the traceback problem in hierarchical WSNs.
author2 Bo-chao Cheng
author_facet Bo-chao Cheng
Guo-tan Liao
廖國潭
author Guo-tan Liao
廖國潭
spellingShingle Guo-tan Liao
廖國潭
A Study of PPM-based Traceback in Sensor Networks
author_sort Guo-tan Liao
title A Study of PPM-based Traceback in Sensor Networks
title_short A Study of PPM-based Traceback in Sensor Networks
title_full A Study of PPM-based Traceback in Sensor Networks
title_fullStr A Study of PPM-based Traceback in Sensor Networks
title_full_unstemmed A Study of PPM-based Traceback in Sensor Networks
title_sort study of ppm-based traceback in sensor networks
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/65700652089448157143
work_keys_str_mv AT guotanliao astudyofppmbasedtracebackinsensornetworks
AT liàoguótán astudyofppmbasedtracebackinsensornetworks
AT guotanliao wúxiàngǎncèwǎnglùyánjiūzhēnduìjīlǜfēngbāobiāojìzhīzhuīsùgōngjījīzhì
AT liàoguótán wúxiàngǎncèwǎnglùyánjiūzhēnduìjīlǜfēngbāobiāojìzhīzhuīsùgōngjījīzhì
AT guotanliao studyofppmbasedtracebackinsensornetworks
AT liàoguótán studyofppmbasedtracebackinsensornetworks
_version_ 1718256941135822848