Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
- 8 July 2004
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 5, 2957-2961 vol.5
- https://doi.org/10.1109/glocom.2003.1258776
Abstract
Ad hoc networks are gaining presence with the proliferation of cheap wireless devices and the need to keep them connected. Individual applications and larger missions, such as those of tactical sensor networks, require secure data transmission among wireless devices. Security remains a major challenge for such networks. Current protocols employ encryption and authentication techniques for secure message exchange, but given the limitations and innately insecure nature of ad-hoc networks, such mechanisms may not suffice. A security breach can, for example, be a network-level denial-of-service (DoS) attack, passive eavesdropping, or physical layer jamming to degrade communication channels. In a multihop network, an intruder node can degrade communication quality by simply dropping packets that are meant to be relayed (forwarded). The network could then misinterpret the cause of packet loss as congestion instead of malicious activity. In this paper, we suggest that traffic transmission patterns be selected to facilitate verification by a receiver. Such traffic patterns are used in concert with suboptimal MAC that preserves the statistical regularity from hop to hop. This general technique for intrusion detection is therefore suitable for networks that are not bandwidth limited but have strict security requirements, e.g., certain kinds of tactical sensor networks.Keywords
This publication has 10 references indexed in Scilit:
- A highly adaptive distributed routing algorithm for mobile wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Self-organized network-layer security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2002
- Security-aware ad hoc routing for wireless networksPublished by Association for Computing Machinery (ACM) ,2001
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Ad-hoc on-demand distance vector routingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1999
- Securing ad hoc networksIEEE Network, 1999
- Signal stability-based adaptive routing (SSA) for ad hoc mobile networksIEEE Wireless Communications, 1997
- Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computersACM SIGCOMM Computer Communication Review, 1994
- New directions in cryptographyIEEE Transactions on Information Theory, 1976