Skip to content

Research at St Andrews

Friend or Flood? Social prevention of flooding attacks in opportunistic networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DOI

Author(s)

Iain Parris, Tristan Henderson

School/Research organisations

Abstract

Opportunistic networks enable decentralised and infrastructure-less social networking applications, through the cooperation of peer mobile devices to forward messages on one another's behalf. The decentralised and cooperative nature of these networks, however, introduces potential security threats. For instance, malicious nodes may modify messages, or send many messages in an attempt to drain other nodes' resources and thereby disrupt the network. Such attacks are well-studied for wireless ad hoc networks, but may need reconsideration in disconnected opportunistic networks. In this paper we define a simple flooding attack that can deny service in an opportunistic network. We simulate the attack and demonstrate its efficacy using real-world datasets. We furthermore develop a scheme for mitigating the attack, by using the social relations between nodes. The scheme is lightweight, requires only local knowledge to be stored by each node, and is shown to be effective: for one dataset, the median proportion of time spent offline by nodes was reduced from 42.7% to 6.3%.
Close

Details

Original languageEnglish
Title of host publicationDistributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on
PublisherIEEE
Pages16-21
Number of pages6
ISBN (Print)978-1-4799-4182-7
DOIs
Publication statusPublished - 30 Jun 2014
EventSixth International Workshop on Hot Topics in Peer-to-peer computing and Online Social neTworking (HotPOST 2014) - Madrid, United Kingdom
Duration: 30 Jun 20143 Jul 2014

Publication series

NameDistributed Computing Systems Workshops (ICDCSW)
PublisherIEEE
ISSN (Print)1545-0678

Conference

ConferenceSixth International Workshop on Hot Topics in Peer-to-peer computing and Online Social neTworking (HotPOST 2014)
CountryUnited Kingdom
CityMadrid
Period30/06/143/07/14

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Co-Creating Autonomy: Group data protection and individual self-determination within a data commons

    Wong, J. & Henderson, T., 2 Feb 2020, (Accepted/In press) Proceedings of the 15th International Digital Curation Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Teaching data ethics: "We're going to ethics the heck out of this"

    Henderson, T., 9 Jan 2019, Proceedings of the 3rd Conference on Computing Education Practice (CEP'19). New York: ACM, 4 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

ID: 104795169

Top