ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks

  • Authors:
  • Heesook Choi;William Enck;Jaesheung Shin;Patrick D. Mcdaniel;Thomas F. Porta

  • Affiliations:
  • Department of Computer Science and Engineering, The Pennsylvania State University, University Park, USA 16802 and Sprint Nextel Applied Research & Advanced Technology Labs (AR & ATL), 1 Adrian Cou ...;Department of Computer Science and Engineering, The Pennsylvania State University, University Park, USA 16802;Department of Computer Science and Engineering, The Pennsylvania State University, University Park, USA 16802;Department of Computer Science and Engineering, The Pennsylvania State University, University Park, USA 16802;Department of Computer Science and Engineering, The Pennsylvania State University, University Park, USA 16802

  • Venue:
  • Wireless Networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical to ensure proper network operation. These measurements are also often used to credit nodes based on their level of participation, or to detect loss. Past solutions employ neighbor monitoring and reporting on traffic forwarding of nodes. These methods are not applicable in civilian networks in which neighbor nodes lack the desire or ability to perform the monitoring function. Such environments occur frequently in which neighbor hosts are resource constrained, or in networks where directional antennas are used and reliable eavesdropping is difficult or impossible. In this article, we propose a protocol that uses nodes on the data path to securely produce packet-forwarding reports. Reporting nodes are chosen randomly and secretly so that malicious nodes cannot modify their behavior based upon the monitoring point. The integrity and authenticity of reports are preserved through the use of secure link layer acknowledgments and monitoring reports. The robustness of the reporting mechanism is strengthened by forwarding the report to multiple destinations (source and destination). We explore the security, cost, and accuracy of our protocol.