Author_Institution :
Dept. of Comput. Sci. & Eng., Oakland Univ., Rochester, MI, USA
Abstract :
Link error and malicious packet dropping are two sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a sequence of packet losses in the network, we are interested in determining whether the losses are caused by link errors only, or by the combined effect of link errors and malicious drop. We are especially interested in the insider-attack case, whereby malicious nodes that are part of the route exploit their knowledge of the communication context to selectively drop a small amount of packets critical to the network performance. Because the packet dropping rate in this case is comparable to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. To improve the detection accuracy, we propose to exploit the correlations between lost packets. Furthermore, to ensure truthful calculation of these correlations, we develop a homomorphic linear authenticator (HLA) based public auditing architecture that allows the detector to verify the truthfulness of the packet loss information reported by nodes. This construction is privacy preserving, collusion proof, and incurs low communication and storage overheads. To reduce the computation overhead of the baseline scheme, a packet-block-based mechanism is also proposed, which allows one to trade detection accuracy for lower computation complexity. Through extensive simulations, we verify that the proposed mechanisms achieve significantly better detection accuracy than conventional methods such as a maximum-likelihood based detection.
Keywords :
ad hoc networks; auditing; computational complexity; data privacy; maximum likelihood detection; telecommunication security; HLA; baseline scheme; channel error rate; communication context; communication overhead; computation complexity; computation overhead; homomorphic linear authenticator; insider-attack case; link error; malicious packet dropping; maximum likelihood detection; multihop wireless ad hoc network; packet dropping attacks; packet loss; privacy preserving; public auditing architecture; storage overhead; truthful detection; Accuracy; Ad hoc networks; Correlation; Cryptography; Packet loss; Wireless communication; Packet dropping; attack detection; auditing; homomorphic linear signature; secure routing;