REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits

William Kozma, Loukas Lazos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Scopus citations

Abstract

Wireless ad hoc networks rely on multi-hop routes to transport data from source to destination. The routing function is implemented in a collaborative manner, with each node responsible for relaying traffic to the destination. However, an increasingly sophisticated pool of users with easy access to commercial wireless devices, combined with the poor physical and software security of the devices, can lead to node misconfiguration or misbehavior. A misbehaving node may refuse to forward packets in order to conserve its energy (selfishness), or simply degrade network performance (maliciousness). In this paper, we investigate the problem of uniquely identifying the set of misbehaving nodes who refuse to forward packets. We propose a novel misbehavior identification scheme called REAct that provides resource-efficient accountability for node misbehavior. REAct identifies misbehaving nodes based on a series of random audits triggered upon a performance drop. We show that a source-destination pair using REAct can identify any number of independently misbehaving nodes based on behavioral proofs provided by nodes. Proofs are constructed using Bloom filters which are storage-efficient membership structures, thus significantly reducing the communication overhead for misbehavior detection.

Original languageEnglish (US)
Title of host publicationProceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09
Pages103-110
Number of pages8
DOIs
StatePublished - Sep 21 2009
Event2nd ACM Conference on Wireless Network Security, WiSec'09 - Zurich, Switzerland
Duration: Mar 16 2009Mar 18 2009

Publication series

NameProceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09

Other

Other2nd ACM Conference on Wireless Network Security, WiSec'09
CountrySwitzerland
CityZurich
Period3/16/093/18/09

Keywords

  • Ad hoc networks
  • Bloom filter
  • Misbehavior
  • Routing

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint Dive into the research topics of 'REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits'. Together they form a unique fingerprint.

  • Cite this

    Kozma, W., & Lazos, L. (2009). REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09 (pp. 103-110). (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09). https://doi.org/10.1145/1514274.1514290