Dealing with liars: Misbehavior identification via Rényi-Ulam games

William Kozma, Loukas Lazos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

We address the problem of identifying misbehaving nodes that refuse to forward packets in wireless multi-hop networks. We map the process of locating the misbehaving nodes to the classic Rényi-Ulam game of 20 questions. Compared to previous methods, our mapping allows the evaluation of node behavior on a per-packet basis, without the need for energy-expensive overhearing techniques or intensive acknowledgment schemes. Furthermore, it copes with colluding adversaries that coordinate their behavioral patterns to avoid identification and frame honest nodes. We show via simulations that our algorithms reduce the communication overhead for identifying misbehaving nodes by at least one order of magnitude compared to other methods, while increasing the identification delay logarithmically with the path size.

Original languageEnglish (US)
Title of host publicationSecurity and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
Pages207-227
Number of pages21
DOIs
StatePublished - 2009
Event5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009 - Athens, Greece
Duration: Sep 14 2009Sep 18 2009

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume19 LNICST
ISSN (Print)1867-8211

Other

Other5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
Country/TerritoryGreece
CityAthens
Period9/14/099/18/09

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Dealing with liars: Misbehavior identification via Rényi-Ulam games'. Together they form a unique fingerprint.

Cite this