DocumentCode
53311
Title
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Author
Tao Shu ; Krunz, Marwan
Author_Institution
Dept. of Comput. Sci. & Eng., Oakland Univ., Rochester, MI, USA
Volume
14
Issue
4
fYear
2015
fDate
April 1 2015
Firstpage
813
Lastpage
828
Abstract
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.
Keywords
ad hoc networks; auditing; computational complexity; data privacy; maximum likelihood detection; telecommunication security; HLA; baseline scheme; channel error rate; communication context; communication overhead; computation complexity; computation overhead; homomorphic linear authenticator; insider-attack case; link error; malicious packet dropping; maximum likelihood detection; multihop wireless ad hoc network; packet dropping attacks; packet loss; privacy preserving; public auditing architecture; storage overhead; truthful detection; Accuracy; Ad hoc networks; Correlation; Cryptography; Packet loss; Wireless communication; Packet dropping; attack detection; auditing; homomorphic linear signature; secure routing;
fLanguage
English
Journal_Title
Mobile Computing, IEEE Transactions on
Publisher
ieee
ISSN
1536-1233
Type
jour
DOI
10.1109/TMC.2014.2330818
Filename
6834783
Link To Document