DocumentCode :
606332
Title :
Face the Enemy: Attack Detection for Planar Graph Routing
Author :
Loch, Adrian ; Hollick, M.
Author_Institution :
Dept. of Comput. Sci., Tech. Univ. Darmstadt, Darmstadt, Germany
fYear :
2013
fDate :
11-15 March 2013
Firstpage :
76
Lastpage :
83
Abstract :
Localized geographic forwarding on planar graphs has been proposed for making routing scalable and efficient in large-scale wireless multihop networks. This approach, which is also known as face routing or perimeter routing, scales almost independently of the network size and is, hence, a promising scheme for the given class of networks. Existing work on this kind of routing focuses on the forwarding mechanisms, but does not yet consider security issues. In this paper, we analyze the specific security vulnerabilities of face routing and present several concepts that exploit its unique characteristics in order to detect attacks on the forwarding process. Our schemes are based on the same abstraction as face routing, namely the so-called faces, which are the polygons formed by the edges of the planar graph. They are defined as own entities in order to abstract from the underlying wireless multihop network. By operating on face abstraction level, the detection responsibility is shared among all the nodes that form the face, which increases the complexity of attacks, since all nodes inside one face need to collude for circumventing our security mechanisms. We implement the proposed mechanisms and perform a simulation study to analyze the effectiveness of our approach. The results show that our schemes sustain a true positive rate close to 100% and can provide improvements in the packet loss ratio of above 90% compared to security mechanisms defined at lower abstraction levels. Exploiting the face abstraction for providing security could be potentially used not only for face routing, but also for general geographic routing schemes in future work.
Keywords :
telecommunication network routing; telecommunication security; attack detection; detection responsibility; face routing; general geographic routing schemes; large-scale wireless multihop networks; localized geographic forwarding; network size; perimeter routing; planar graph routing; polygons; security mechanisms; specific security vulnerabilities; Communication system security; Cryptography; Face; Routing; Topology; Wireless communication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networked Systems (NetSys), 2013 Conference on
Conference_Location :
Stuttgart
Print_ISBN :
978-1-4673-5645-9
Electronic_ISBN :
978-0-7695-4950-7
Type :
conf
DOI :
10.1109/NetSys.2013.16
Filename :
6529239
Link To Document :
بازگشت