TY - GEN
T1 - A cross-layer dropping attack in video streaming over ad hoc networks
AU - Shao, Min
AU - Zhu, Sencun
AU - Cao, Guohong
AU - La Porta, Tom
AU - Mohapatra, Prasant
PY - 2008
Y1 - 2008
N2 - Significant progress has been made to achieve video streaming over wireless ad hoc networks. However, there is not much work on providing security. Is existing security solution good enough for securing video streaming over ad hoc networks? In this paper, we discover a cross-layer dropping attack against video streaming. We first identify a general IP layer dropping attack and then reveal its destructive impact by leveraging the application layer information (e.g., video streaming). Through simulations, we quantify the impact of this attack as a function of several performance parameters such as delivery ratio, hop number and the number of attackers. The surprising result with this attack is that with a 94% delivery ratio, the receiver still cannot watch the video! We also propose several possible solutions to address the dropping attacks. Due to the unique characteristics of this attack, as long as malicious nodes exist, the network will suffer from this dropping attack.
AB - Significant progress has been made to achieve video streaming over wireless ad hoc networks. However, there is not much work on providing security. Is existing security solution good enough for securing video streaming over ad hoc networks? In this paper, we discover a cross-layer dropping attack against video streaming. We first identify a general IP layer dropping attack and then reveal its destructive impact by leveraging the application layer information (e.g., video streaming). Through simulations, we quantify the impact of this attack as a function of several performance parameters such as delivery ratio, hop number and the number of attackers. The surprising result with this attack is that with a 94% delivery ratio, the receiver still cannot watch the video! We also propose several possible solutions to address the dropping attacks. Due to the unique characteristics of this attack, as long as malicious nodes exist, the network will suffer from this dropping attack.
UR - http://www.scopus.com/inward/record.url?scp=70249120770&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70249120770&partnerID=8YFLogxK
U2 - 10.1145/1460877.1460909
DO - 10.1145/1460877.1460909
M3 - Conference contribution
AN - SCOPUS:70249120770
SN - 9781605582412
T3 - Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08
BT - Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08
T2 - 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08
Y2 - 22 September 2008 through 25 September 2008
ER -