TY - GEN
T1 - Dealing with liars
T2 - 5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
AU - Kozma, William
AU - Lazos, Loukas
N1 - Funding Information:
This research was supported by BAE systems, and Connection One (an I/UCRC NSF/industry/university consortium).
PY - 2009
Y1 - 2009
N2 - We address the problem of identifying misbehaving nodes that refuse to forward packets in wireless multi-hop networks. We map the process of locating the misbehaving nodes to the classic Rényi-Ulam game of 20 questions. Compared to previous methods, our mapping allows the evaluation of node behavior on a per-packet basis, without the need for energy-expensive overhearing techniques or intensive acknowledgment schemes. Furthermore, it copes with colluding adversaries that coordinate their behavioral patterns to avoid identification and frame honest nodes. We show via simulations that our algorithms reduce the communication overhead for identifying misbehaving nodes by at least one order of magnitude compared to other methods, while increasing the identification delay logarithmically with the path size.
AB - We address the problem of identifying misbehaving nodes that refuse to forward packets in wireless multi-hop networks. We map the process of locating the misbehaving nodes to the classic Rényi-Ulam game of 20 questions. Compared to previous methods, our mapping allows the evaluation of node behavior on a per-packet basis, without the need for energy-expensive overhearing techniques or intensive acknowledgment schemes. Furthermore, it copes with colluding adversaries that coordinate their behavioral patterns to avoid identification and frame honest nodes. We show via simulations that our algorithms reduce the communication overhead for identifying misbehaving nodes by at least one order of magnitude compared to other methods, while increasing the identification delay logarithmically with the path size.
UR - http://www.scopus.com/inward/record.url?scp=84885887137&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84885887137&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-05284-2_12
DO - 10.1007/978-3-642-05284-2_12
M3 - Conference contribution
AN - SCOPUS:84885887137
SN - 3642052835
SN - 9783642052835
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 207
EP - 227
BT - Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
Y2 - 14 September 2009 through 18 September 2009
ER -