• DocumentCode
    606332
  • Title

    Face the Enemy: Attack Detection for Planar Graph Routing

  • Author

    Loch, Adrian ; Hollick, M.

  • Author_Institution
    Dept. of Comput. Sci., Tech. Univ. Darmstadt, Darmstadt, Germany
  • fYear
    2013
  • fDate
    11-15 March 2013
  • Firstpage
    76
  • Lastpage
    83
  • Abstract
    Localized geographic forwarding on planar graphs has been proposed for making routing scalable and efficient in large-scale wireless multihop networks. This approach, which is also known as face routing or perimeter routing, scales almost independently of the network size and is, hence, a promising scheme for the given class of networks. Existing work on this kind of routing focuses on the forwarding mechanisms, but does not yet consider security issues. In this paper, we analyze the specific security vulnerabilities of face routing and present several concepts that exploit its unique characteristics in order to detect attacks on the forwarding process. Our schemes are based on the same abstraction as face routing, namely the so-called faces, which are the polygons formed by the edges of the planar graph. They are defined as own entities in order to abstract from the underlying wireless multihop network. By operating on face abstraction level, the detection responsibility is shared among all the nodes that form the face, which increases the complexity of attacks, since all nodes inside one face need to collude for circumventing our security mechanisms. We implement the proposed mechanisms and perform a simulation study to analyze the effectiveness of our approach. The results show that our schemes sustain a true positive rate close to 100% and can provide improvements in the packet loss ratio of above 90% compared to security mechanisms defined at lower abstraction levels. Exploiting the face abstraction for providing security could be potentially used not only for face routing, but also for general geographic routing schemes in future work.
  • Keywords
    telecommunication network routing; telecommunication security; attack detection; detection responsibility; face routing; general geographic routing schemes; large-scale wireless multihop networks; localized geographic forwarding; network size; perimeter routing; planar graph routing; polygons; security mechanisms; specific security vulnerabilities; Communication system security; Cryptography; Face; Routing; Topology; Wireless communication;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networked Systems (NetSys), 2013 Conference on
  • Conference_Location
    Stuttgart
  • Print_ISBN
    978-1-4673-5645-9
  • Electronic_ISBN
    978-0-7695-4950-7
  • Type

    conf

  • DOI
    10.1109/NetSys.2013.16
  • Filename
    6529239