Neighborhood monitoring in ad hoc networks

  • Authors:
  • Axel Krings;Stephan Muehlbacher-Karrer

  • Affiliations:
  • University of Idaho, Moscow, ID;University of Idaho, Moscow, ID

  • Venue:
  • Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Much research in ad hoc networks utilizes monitoring mechanisms to detect maliciously acting nodes. The faults that a system is exposed to range from simple omissions to packet manipulations and misrouting. Several monitoring techniques have been presented that address malicious behavior in specific environments, but each has their restrictive assumptions about detection and mitigation in hostile environments. We generalize the notion of malicious behavior of related research and outline a k-hop monitoring approach that allows us to drop many assumptions limiting previous work. Specifically, we include collaboration of malicious nodes, the presence of malicious nodes during neighborhood exploration, and misrouting. However, the approach exposes also the associated overhead in providing detection and correction thresholds.