CFP last date
20 May 2024
Reseach Article

An Efficient Security Mechanism to Detect the Packet Droppers in a MANET under Individual and Collusive Adversarial Models

by Shirina Samreen, G. Narsimha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 2
Year of Publication: 2013
Authors: Shirina Samreen, G. Narsimha
10.5120/14091-2095

Shirina Samreen, G. Narsimha . An Efficient Security Mechanism to Detect the Packet Droppers in a MANET under Individual and Collusive Adversarial Models. International Journal of Computer Applications. 82, 2 ( November 2013), 39-43. DOI=10.5120/14091-2095

@article{ 10.5120/14091-2095,
author = { Shirina Samreen, G. Narsimha },
title = { An Efficient Security Mechanism to Detect the Packet Droppers in a MANET under Individual and Collusive Adversarial Models },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 2 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number2/14091-2095/ },
doi = { 10.5120/14091-2095 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:10.389864+05:30
%A Shirina Samreen
%A G. Narsimha
%T An Efficient Security Mechanism to Detect the Packet Droppers in a MANET under Individual and Collusive Adversarial Models
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 2
%P 39-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Most of the existing security mechanisms for detecting the packet droppers in a mobile ad hoc network generally detect the adversarial nodes performing the packet drop individually wherein false accusations upon an honest node by an adversarial node are also possible. In this paper, we propose a security mechanism to detect those nodes performing packet dropping either on their own individually or in collusion such that they cannot evade detection and no false accusations are possible. The detection of adversarial nodes is done by the source node through the analysis of the reports submitted by all the intermediate nodes on the source to destination paths. The composition of the report from each of the intermediate nodes involves certain pre-computed hash values which act as acknowledgments from each receiver node (successor) to the forwarder node (predecessor) and also a secure proof through which each intermediate node claims the packets which have been received within a communication session. The proposed mechanism has minimum communication and computational overhead since the secure proof is based upon a hash computation and report submission is secured through symmetric cryptographic primitives. The report analysis process ensures that evading the detection is not possible even in collusive adversarial model.

References
  1. L. Buttyán, and J. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," Mobile Net works and Applications, 8(5), pp. 579-592, 2003.
  2. M. Jakobsson, J. -P. Hubaux, and L. Buttyan, "A micropayment scheme encouraging collaboration in multi-hop cellular networks," in Financial Crypto, 2003.
  3. S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks," in IEEE INFOCOM, pp. 1987-1997, 2003.
  4. Mohamed Elsalih Mahmoud and X. Shen, "An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Dropping Attack in Multihop Wireless Networks", IEEE Transactions On Vehicular Technology (IEEE TVT), Vol. 60, No. 8, pp. 3947-3962, 2011
  5. M. Mahmoud and X. Shen, "ESIP: Secure incentive protocol with limited use of public-key cryptography for multi-hop wireless networks", IEEE Transactions on Mobile Computing (IEEE TMC), vol. 10, no. 7, pp. 997-1010, July 2011
  6. Mohamed M. E. A. Mahmoud and X. Shen, "A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks", IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 2, pp. 209–224, Feb 2013
  7. S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th Annual international Conference on Mobile Computing and Networking (MOBICOM), pp. 255-265, 2000
  8. S. Buchegger and J. -Y. L. Boudec, "Self-policing mobile ad-hoc networks by reputation systems," IEEE communications Magazine, pp. 101-107, 2005
  9. P. Michiardi, and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proceedings of IFIP Joint Working Conference on Communications and Multimedia Security, pp. 107-121, 2002
  10. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks," ACM Trans. Inf. Syst. Secur. 10(4), 1-35, 2008
  11. Panagiotis Papadimitratos *, Zygmunt J. Haas,"Secure message transmission in mobile ad hoc networks", Proceedings of the 2nd ACM workshop on Wireless security, WiSe 2003
  12. M. Just, E. Kranakis, and T. Wan, "Resisting malicious packet dropping in wireless ad-hoc networks using distributed probing," in Proceedings of ADHOC-NOW '03, Oct. 2003
  13. I. Avramopoulos and J. Rexford, "Stealth Probing: Efficient Data-Plane Security for IP Routing," In Proc. USENIX Annual Technical Conference, Boston, MA, May 2006
  14. Khalil And Bagchi: Stealthy Attacks In Wireless Ad Hoc Networks: Detection And Countermeasure 2011 IEEE Transactions On Mobile Computing, Vol. 10, No. 8, August 2011
  15. W. Kozma, and L. Lazos, "REAct: resource-efficient accountability for node misbehavior in ad hoc networks based on random audits," in Proceedings of the Second ACM Conference on Wireless Network Security (WiSec), pp. 103-110, 2009
  16. K. Liu, J. Deng, P. Varshney, K. Balakrishnan, "An Acknowledgment Based Approach for the Detection of Routing Misbehavior in MANETs," IEEE Transactions on Mobile Computing, 6(5), pp. 536550, 2007.
  17. Muhammad Zeshan, Shoab A. Khan, Ahmad Raza Cheema, and Attique Ahmed, "Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks," International Seminar on Future Information Technology and Management Engineering, November 2008, pp. 568- 572.
Index Terms

Computer Science
Information Sciences

Keywords

Packet droppers Colluding adversaries Reports Secure proof Onion hash.