TY - CHAP
T1 - Resisting malicious packet dropping in wireless ad hoc networks
AU - Just, Mike
AU - Kranakis, Evangelos
AU - Wan, Tao
PY - 2003
Y1 - 2003
N2 - Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to various types of Denial of Service (DoS) attacks. We present a distributed probing technique to detect and mitigate one type of DoS attacks, namely malicious packet dropping, in wireless ad hoc networks. A malicious node can promise to forward packets but in fact fails to do so. In our distributed probing technique, every node in the network will probe the other nodes periodically to detect if any of them fail to perform the forwarding function. Subsequently, node state information can be utilized by the routing protocol to bypass those malicious nodes. Our experiments show that in a moderately changing network, the probing technique can detect most of the malicious nodes with a relatively low false positive rate. The packet delivery rate in the network can also be increased accordingly.
AB - Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to various types of Denial of Service (DoS) attacks. We present a distributed probing technique to detect and mitigate one type of DoS attacks, namely malicious packet dropping, in wireless ad hoc networks. A malicious node can promise to forward packets but in fact fails to do so. In our distributed probing technique, every node in the network will probe the other nodes periodically to detect if any of them fail to perform the forwarding function. Subsequently, node state information can be utilized by the routing protocol to bypass those malicious nodes. Our experiments show that in a moderately changing network, the probing technique can detect most of the malicious nodes with a relatively low false positive rate. The packet delivery rate in the network can also be increased accordingly.
U2 - 10.1007/978-3-540-39611-6_14
DO - 10.1007/978-3-540-39611-6_14
M3 - Other chapter contribution
SN - 978-3-540-20260-8
VL - 2865
T3 - Ad-Hoc, Mobile, and Wireless Networks
SP - 151
EP - 163
BT - Proceedings of the Second International Conference on Ad-Hoc, Mobile, and Wireless Networks
PB - Springer
ER -