Detecting Malicious Packet Dropping Using Traffic Patterns in MANET
DOI:
https://doi.org/10.14209/jcis.2003.26Keywords:
MANET, Intrusion Detection, Packet DroppingAbstract
Ad hoc networks are gaining presence with the proliferation of cheap wireless devices and the need to keep them connected. Individual applications and largermissions. such as those of tactical sensor networks. require secure data transmission among wireless devices. Security remains a major challenge for such networks. Current protocols employ encryption and authentication techniques for secure message exchange. but given the limitations and
innately insecure nature of ad-hoc networks. such mechanisms may not suffice. A security breach can. for example, be a network-level denial-of-service (DoS) attack, passive eavesdropping, or physical layer jamming to degrade communication channels. In a multihop network, an intruder node can degrade communication quality by simply dropping packets that arc meant to be relayed
(forwarded). The network could then misinterpret the cause of packet loss as congestion instead of malicious activity. In this paper, we suggest that traffic transmission patterns be selected to facilitate verification by a receiver. Such traffic patterns are used in concert with suboptimal MAC that preserves the statistical regularity from hop to hop. This general technique for intrusion detection is therefore suitable for networks that are not bandwidth limited but
have strict security requirements, e.g., certain kinds of tactical sensor networks.
Downloads
Download data is not yet available.
Downloads
Published
2017-11-14
How to Cite
Rao, R. N., & Kesidis, G. (2017). Detecting Malicious Packet Dropping Using Traffic Patterns in MANET. Journal of Communication and Information Systems, 18(2). https://doi.org/10.14209/jcis.2003.26
Issue
Section
Regular Papers
License
Authors who publish in this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 (Attribution-NonCommercial 4.0 International) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors can enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) before and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
___________
Received 2017-11-07
Accepted 2017-11-13
Published 2017-11-14
Accepted 2017-11-13
Published 2017-11-14