MIMI: Mitigating packet misrouting in locally-monitored multi-hop wireless ad hoc networks

Issa Khalil*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to an attack called misrouting attack. Packet misrouting disrupts the packet from reaching the destination by malicious behavior at an intermediate node. However, the malicious node gives the impression to its neighbors that it performed the legitimate forwarding action. Moreover, a legitimate node comes under suspicion. I provide a protocol called MIMI based on local monitoring to remedy the attack. It requires the neighbors to maintain additional information about the routing path. I show through performance analysis that the basic local monitoring fails to mitigate the misrouting attack while MIMI successfully does.

Original languageEnglish
Title of host publication2008 IEEE Global Telecommunications Conference, GLOBECOM 2008
Pages773-777
Number of pages5
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event2008 IEEE Global Telecommunications Conference, GLOBECOM 2008 - New Orleans, LA, United States
Duration: 30 Nov 20084 Dec 2008

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Conference

Conference2008 IEEE Global Telecommunications Conference, GLOBECOM 2008
Country/TerritoryUnited States
CityNew Orleans, LA
Period30/11/084/12/08

Keywords

  • Local monitoring
  • Misrouting
  • Multi-hop wireless networks
  • Packet dropping
  • Transmission power control

Fingerprint

Dive into the research topics of 'MIMI: Mitigating packet misrouting in locally-monitored multi-hop wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this