MPC: Mitigating stealthy power control attacks in wireless ad hoc networks

Issa Khalil*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to stealthy packet dropping through transmission power control. Stealthy packet dropping disrupts the packet from reaching the destination by malicious behavior at an intermediate node. However, the malicious node gives the impression to its neighbors that it performed the legitimate forwarding action. Moreover, a legitimate node comes under suspicion. We provide a protocol called MPC to remedy the attack. MPC expands the set of possible monitors of a node by redefining the monitor role and functionality. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy power control attacks while MPC successfully mitigates them.

Original languageEnglish
Title of host publicationGLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 IEEE Global Telecommunications Conference, GLOBECOM 2009 - Honolulu, HI, United States
Duration: 30 Nov 20094 Dec 2009

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Conference

Conference2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
Country/TerritoryUnited States
CityHonolulu, HI
Period30/11/094/12/09

Keywords

  • Local monitoring
  • Malicious node
  • Multi-hop wireless networks
  • Packet dropping
  • Transmission power control

Fingerprint

Dive into the research topics of 'MPC: Mitigating stealthy power control attacks in wireless ad hoc networks'. Together they form a unique fingerprint.

Cite this