{"title":"Witness-Based Detection of Forwarding Misbehaviors in Wireless Networks","authors":"Sookhyun Yang, Sudarshan Vasudevan, J. Kurose","doi":"10.1109/WIMESH.2010.5507909","DOIUrl":null,"url":null,"abstract":"We consider the problem of identifying a node that incorrectly forwards packets in a static wireless ad hoc network. We propose a detection scheme that identifies a misbehaving node based on observations made by neighboring nodes (witnesses) near the forwarding node. Without longterm or cumulative observation, the proposed scheme makes an instantaneous decision about whether a node is correctly forwarding a packet. Through extensive analysis under various threat scenarios, we show that our scheme can unambiguously identify a misbehaving node when there is no collusion. We analyze our scheme's detection accuracy accounting for the lossy nature of wireless links, finding that our scheme can achieve high detection accuracy while incurring low communication overhead.","PeriodicalId":368847,"journal":{"name":"2010 Fifth IEEE Workshop on Wireless Mesh Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Fifth IEEE Workshop on Wireless Mesh Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIMESH.2010.5507909","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
We consider the problem of identifying a node that incorrectly forwards packets in a static wireless ad hoc network. We propose a detection scheme that identifies a misbehaving node based on observations made by neighboring nodes (witnesses) near the forwarding node. Without longterm or cumulative observation, the proposed scheme makes an instantaneous decision about whether a node is correctly forwarding a packet. Through extensive analysis under various threat scenarios, we show that our scheme can unambiguously identify a misbehaving node when there is no collusion. We analyze our scheme's detection accuracy accounting for the lossy nature of wireless links, finding that our scheme can achieve high detection accuracy while incurring low communication overhead.