TY - GEN
T1 - MPC
T2 - 2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
AU - Khalil, Issa
PY - 2009
Y1 - 2009
N2 - Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission power control. Stealthy packet dropping disrupts the packet from reaching the destination by malicious behavior at an intermediate node. However, the malicious node gives the impression to its neighbors that it performed the legitimate forwarding action. Moreover, a legitimate node comes under suspicion. We provide a protocol called MPC to remedy the attack. MPC expands the set of possible monitors of a node by redefining the monitor role and functionality. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy power control attacks while MPC successfully mitigates them.
AB - Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission power control. Stealthy packet dropping disrupts the packet from reaching the destination by malicious behavior at an intermediate node. However, the malicious node gives the impression to its neighbors that it performed the legitimate forwarding action. Moreover, a legitimate node comes under suspicion. We provide a protocol called MPC to remedy the attack. MPC expands the set of possible monitors of a node by redefining the monitor role and functionality. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy power control attacks while MPC successfully mitigates them.
KW - Local monitoring
KW - Malicious node
KW - Multi-hop wireless networks
KW - Packet dropping
KW - Transmission power control
UR - http://www.scopus.com/inward/record.url?scp=77951599568&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77951599568&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2009.5425559
DO - 10.1109/GLOCOM.2009.5425559
M3 - Conference contribution
AN - SCOPUS:77951599568
SN - 9781424441488
T3 - GLOBECOM - IEEE Global Telecommunications Conference
BT - GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
Y2 - 30 November 2009 through 4 December 2009
ER -