Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Secure traceroute to detect faulty or malicious routing
ACM SIGCOMM Computer Communication Review
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Low-power DoS attacks in data wireless LANs and countermeasures
ACM SIGMOBILE Mobile Computing and Communications Review
Short Signatures from the Weil Pairing
Journal of Cryptology
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
802.11 markov channel modeling
802.11 markov channel modeling
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
IEEE Transactions on Mobile Computing
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Compact Proofs of Retrievability
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Proceedings of the second ACM conference on Wireless network security
Proofs of Storage from Homomorphic Identification Protocols
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Privacy-preserving public auditing for data storage security in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Castor: scalable secure routing for ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Packet-Hiding Methods for Preventing Selective Jamming Attacks
IEEE Transactions on Dependable and Secure Computing
Hi-index | 0.00 |
In a multi-hop wireless ad hoc network, packet losses are attributed to harsh channel conditions and intentional packet discard by malicious nodes. In this paper, while observing a sequence of packet losses, we are interested in determining whether losses are due to link errors only, or due to the combined effect of link errors and malicious drop. We are especially interested in insider's attacks, whereby a malicious node that is part of the route exploits its knowledge of the communication context to selectively drop a small number of packets that are critical to network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This architecture is privacy preserving, collusion proof, and incurs low communication and storage overheads. Through extensive simulations, we verify that the proposed mechanism achieves significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.