Journal
IEEE TRANSACTIONS ON MOBILE COMPUTING
Volume 14, Issue 4, Pages 813-828Publisher
IEEE COMPUTER SOC
DOI: 10.1109/TMC.2014.2330818
Keywords
Packet dropping; secure routing; attack detection; homomorphic linear signature; auditing
Funding
- US National Science Foundation (NSF) [CNS-1343156.]
- NSF [CNS-1016943, IIP-1265960]
- ARO [W911NF-13-1-0302]
- Direct For Computer & Info Scie & Enginr
- Division Of Computer and Network Systems [1343156, 1409172] Funding Source: National Science Foundation
- Direct For Computer & Info Scie & Enginr
- Division Of Computer and Network Systems [1265960] Funding Source: National Science Foundation
Ask authors/readers for more resources
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available