WIRELESS AD HOC NETWORKS
Link error and malicious
packet dropping are two sources for packet losses in multi-hop wireless ad hoc
network. In this paper, while observing a sequence of packet losses in the
network, we are interested in determining whether the losses are caused by link
errors only, or by the combined effect of link errors and malicious drop. We
are especially interested in the insider-attack case, whereby malicious nodes
that are part of the route exploit their knowledge of the communication context
to selectively drop a small amount of packets critical to the network
performance. , we develop a homomorphic
linear authenticator (HLA) based public auditing architecture that allows the
detector to verify the truthfulness of the packet loss information reported by
nodes.
In a multi-hop wireless network, nodes cooperate in relaying/routing traffic. An adversary can exploit this cooperative nature
to launch attacks. For example, the adversary may first pretend to be a
cooperative node in the route discovery process. Once being included in a
route, the adversary starts dropping packets. In the most severe form, the malicious node simply stops
forwarding every packet received from upstream nodes, completely disrupting the
path between the source and the destination. Eventually, such a severe
denial-of-service (DoS) attack can paralyze the network by partitioning its
topology. First, the continuous presence of extremely high packet loss rate at
the malicious nodes makes this type of attack easy to be detected. Second, once
being detected, these attacks are easy to mitigate.
No comments:
Post a Comment