skip to main content
10.1145/1460877.1460909acmotherconferencesArticle/Chapter ViewAbstractPublication PagessecurecommConference Proceedingsconference-collections
research-article

A cross-layer dropping attack in video streaming over ad hoc networks

Published: 22 September 2008 Publication History

Abstract

Significant progress has been made to achieve video streaming over wireless ad hoc networks. However, there is not much work on providing security. Is existing security solution good enough for securing video streaming over ad hoc networks? In this paper, we discover a cross-layer dropping attack against video streaming. We first identify a general IP layer dropping attack and then reveal its destructive impact by leveraging the application layer information (e.g., video streaming). Through simulations, we quantify the impact of this attack as a function of several performance parameters such as delivery ratio, hop number and the number of attackers. The surprising result with this attack is that with a 94% delivery ratio, the receiver still cannot watch the video! We also propose several possible solutions to address the dropping attacks. Due to the unique characteristics of this attack, as long as malicious nodes exist, the network will suffer from this dropping attack.

References

[1]
Glomosim, http://pcl.cs.ucla.edu/projects/glomosim/.
[2]
http://trace.eas.asu.edu/tracemain.html.
[3]
http://trace.eas.asu.edu/trace/pics/frametrace/mp4/verbose _firstcontact.dat.
[4]
http://www.mpeg.org/.
[5]
Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst., 18(4):460--473, 2007. Member-Runfang Zhou and Fellow-Kai Hwang.
[6]
Rtp control protocol extended reports (rtcp xr), Internet RFC 3611, 2003.
[7]
I. Aad, J.-P. Hubaux, and E. W. Knightly. Denial of service resilience in ad hoc networks. In MobiCom '04.
[8]
S. Buchegger and J.-Y. L. Boudec. Performance analysis of the CONFIDANT protocol. In MobiHoc '02.
[9]
S. Buchegger and J.-Y. Le Boudec. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In P2PEcon 2004.
[10]
C.-O. Chow and H. Ishii. Enhancing real-time video streaming over mobile ad hoc networks using multipoint-to-point communication. Comput. Commun., 30(8):1754--1764, 2007.
[11]
M. Guo, M. H. Ammar, and E. W. Zegura. V3: A vehicle-to-vehicle live video streaming architecture. In PERCOM '05.
[12]
M.-Y. Hsieh, Y.-M. Huang, and T.-C. Chiang. Transmission of layered video streaming via multi-path on ad hoc networks. Multimedia Tools Appl., 34(2):155--177, 2007.
[13]
Y.-C. Hu, D. B. Johnson, and A. Perrig. Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. In WMCSA '02.
[14]
Y.-C. Hu and A. Perrig. A survey of secure wireless ad hoc routing. IEEE Security and Privacy, 2(3):28--39, 2004.
[15]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw., 11(1--2):21--38, 2005.
[16]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In WWW '03.
[17]
S. Lin, Y. Wang, S. Mao, and S. Panwar. Video transport over ad-hoc networks using multiple paths. IEEE International Symposium on Circuits and Systems, 1:57--60, 2002.
[18]
H. Luo, R. Ramjee, P. Sinha, L. Li and S. Lu. UCAN: A Unified Cellular and Ad-Hoc Network Architecture. In MobiCom '03.
[19]
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In MobiCom '00, Boston, MA, USA.
[20]
H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. Rtp: A transport protocol for real-time applications, Internet RFC 3550, 2003.
[21]
H. Schulzrinne, A. Rao, and R. Lanphier. Real time streaming protocol (rtsp), Internet RFC 2326, 1998.
[22]
E. Setton, T. Yoo, X. Zhu, A. Goldsmith, and B. Girod. Cross-layer design of ad hoc networks for real-time video streaming. Wireless Communications, IEEE, 12(4):59--65, 2005.
[23]
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc '05.
[24]
H. Yang, X. Meng, and S. Lu. Self-organized Network Layer Security in Mobile Ad Hoc Networks. In ACM Wireless Security Workshop, 2002.

Cited By

View all
  • (2019)Taming Cross-Layer Attacks in Wireless Networks: A Bayesian Learning ApproachIEEE Transactions on Mobile Computing10.1109/TMC.2018.286415518:7(1688-1702)Online publication date: 1-Jul-2019
  • (2018)RMDD: Cross Layer Attack in Internet of Things2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)10.1109/ICACCI.2018.8554471(172-178)Online publication date: Sep-2018
  • (2017)UML Modeling of Cross-Layer Attack in Wireless Sensor NetworksInteroperability, Safety and Security in IoT10.1007/978-3-319-52727-7_12(104-115)Online publication date: 15-Feb-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
SecureComm '08: Proceedings of the 4th international conference on Security and privacy in communication netowrks
September 2008
329 pages
ISBN:9781605582412
DOI:10.1145/1460877
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Create-Net
  • INRIA: Institut Natl de Recherche en Info et en Automatique

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ad hoc networks
  2. cross-layer
  3. dropping attack
  4. security
  5. video streaming

Qualifiers

  • Research-article

Funding Sources

Conference

Securecomm08
Sponsor:
  • INRIA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Taming Cross-Layer Attacks in Wireless Networks: A Bayesian Learning ApproachIEEE Transactions on Mobile Computing10.1109/TMC.2018.286415518:7(1688-1702)Online publication date: 1-Jul-2019
  • (2018)RMDD: Cross Layer Attack in Internet of Things2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)10.1109/ICACCI.2018.8554471(172-178)Online publication date: Sep-2018
  • (2017)UML Modeling of Cross-Layer Attack in Wireless Sensor NetworksInteroperability, Safety and Security in IoT10.1007/978-3-319-52727-7_12(104-115)Online publication date: 15-Feb-2017
  • (2012)Cross-Layer Design for Network Security EnhancementUsing Cross-Layer Techniques for Communication Systems10.4018/978-1-4666-0960-0.ch006(138-151)Online publication date: 2012

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media