4th International ICST Conference on Security and Privacy in Communication Networks

Research Article

A Cross-layer Dropping Attack in Video Streaming over Ad Hoc Networks

  • @INPROCEEDINGS{10.1145/1460877.1460909,
        author={Min Shao and Sencun Zhu and Guohong Cao and Tom La Porta and Prasant Mohapatra},
        title={A Cross-layer Dropping Attack in Video Streaming over Ad Hoc Networks},
        proceedings={4th International ICST Conference on Security and Privacy in Communication Networks},
        publisher={ACM},
        proceedings_a={SECURECOMM},
        year={2008},
        month={9},
        keywords={Cross-layer Dropping Attack Security Video Streaming Ad Hoc Networks},
        doi={10.1145/1460877.1460909}
    }
    
  • Min Shao
    Sencun Zhu
    Guohong Cao
    Tom La Porta
    Prasant Mohapatra
    Year: 2008
    A Cross-layer Dropping Attack in Video Streaming over Ad Hoc Networks
    SECURECOMM
    ACM
    DOI: 10.1145/1460877.1460909
Min Shao1,*, Sencun Zhu1,*, Guohong Cao1,*, Tom La Porta1,*, Prasant Mohapatra2,*
  • 1: Department of Computer Science & Engineering The Pennsylvania State University
  • 2: Department of Computer Science University of California at Davis
*Contact email: mshao@cse.psu.edu, szhu@cse.psu.edu, gcao@cse.psu.edu, tlp@cse.psu.edu, prasant@cs.ucdavis.edu

Abstract

Significant progress has been made to achieve video streaming over wireless ad hoc networks. However, there is not much work on providing security. Is existing security solution good enough for securing video streaming over ad hoc networks? In this paper, we discover a cross-layer dropping attack against video streaming. We first identify a general IP layer dropping attack and then reveal its destructive impact by leveraging the application layer information (e.g., video streaming). Through simulations, we quantify the impact of this attack as a function of several performance parameters such as delivery ratio, hop number and the number of attackers. The surprising result with this attack is that with a 94% delivery ratio, the receiver still cannot watch the video! We also propose several possible solutions to address the dropping attacks. Due to the unique characteristics of this attack, as long as malicious nodes exist, the network will suffer from this dropping attack.