CIPSEC will be at IEEE WoWMoM 2018

Tuesday, June 12, 2018
(Chania, Greece)

CIPSEC will be at IEEE WoWMoM 2018 (IEEE International Symposium on on a World of Wireless, Mobile and Multimedia Networks ) represented by University of Darmstadt (TUD)

IEEE WoWMoM 2018 offers a four-day technical program including keynote speeches, hot-topic panel sessions, tutorials, demonstrations, and PhD forum. Several workshops will be held in conjunction with the symposium. It will be discussed the evolution of wireless networking technologies and their key role in future Internet scenarios offer an increasing wealth of opportunities for distributing multimedia contents over wireless networks, enabling dissemination of professional contents to mobile users as well as sharing user-generated contents among them.

Researches from TUD (H. Ismail, S. Roos, N. Suri) are authors of the paper "A Detection Mechanism for Internal Attacks in P2P Streaming Systems" accepted to be presented at this conference.

Date streaming is a very popular service in multiple critical infrastructures, and P2P based solutions for streaming can reduce costs for both providers and users. Yet, involving users into the data dissemination entails security risks including a variety of denial-of-service attacks. While extensive research exists on mitigating varied attack types, their effectiveness is limited if the attacker can infer information about the topology such as the identity of nodes that have direct connections to the source. Our research focuses on the critical class of internal inference attacks for pull-based overlays: the attacker first infers the overlay’s topology. Based on the gained knowledge, the attacker positions malicious peers in prominent positions and performs a buffer-map cheating attack. By dropping chunks that should be forwarded, the malicious peers degrade the performance in a stealthy way that does not raise suspicion. We first demonstrate the feasibility of conducting such attacks. Accordingly, we propose a detection mechanism that identifies the attack and removes potential malicious peers from their prominent positions. Our simulation-based study indicates that the detection mechanism is able to detect malicious peers with up to 80-90% accuracy while inducing a small overhead of ~8%. Furthermore, we ascertain theoretically and through simulations that malicious peers cannot misuse the detection mechanism to gain influence.