Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks

Tao Shu, Marwan Krunz

Research output: Contribution to journalArticlepeer-review

59 Scopus citations

Abstract

Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.

Original languageEnglish (US)
Article number6834783
Pages (from-to)813-828
Number of pages16
JournalIEEE Transactions on Mobile Computing
Volume14
Issue number4
DOIs
StatePublished - Apr 1 2015

Keywords

  • Packet dropping
  • attack detection
  • auditing
  • homomorphic linear signature
  • secure routing

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this