Title
Secure reporting of traffic forwarding activity in mobile ad hoc networks
Abstract
Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical to ensure proper network operation. These measurements are often used to credit nodes based on their level of participation, or to detect loss. Past solutions employ neighbor monitoring and reporting on node forwarding traffic. These methods are not applicable in civilian networks where neighbor nodes lack the desire or ability to perform the monitoring function. Such environments occur frequently in which neighbor hosts are resource constrained, or in networks where directional antennas are used and reliable monitoring is difficult or impossible. In this paper, we propose a protocol that uses nodes on the data path to securely produce packet forwarding reports. Reporting nodes are chosen randomly and secretly so that malicious nodes cannot modify their behavior based upon the monitoring point. The integrity and authenticity of reports are preserved through the use of secure link layer acknowledgments and monitoring reports. The robustness of the reporting mechanism is strengthened by forwarding the report to multiple destinations (source and destination). We explore the security, cost, and accuracy of our protocol.
Year
DOI
Venue
2005
10.1109/MOBIQUITOUS.2005.53
MobiQuitous
Keywords
Field
DocType
traffic forwarding,neighbor node,protocols,authenticity report,packet forwarding report,traffic measurement,traffic forwarding activity,monitoring,reliable monitoring,civilian application,monitoring function,mobile ad hoc network,neighbor host,secure reporting,directional antenna,directive antennas,mobile radio,neighbor monitoring,mobile ad hoc networks,telecommunication security,telecommunication traffic,message authentication,node forwarding traffic,ad hoc networks,nodes forward data,monitoring point,data integrity,secure link layer acknowledgment,link layer,security,packet forwarding,robustness,directional antennas
Mobile ad hoc network,Mobile radio,Message authentication code,Computer science,Computer security,Computer network,Robustness (computer science),Link layer,Data integrity,Wireless ad hoc network,Packet forwarding
Conference
ISBN
Citations 
PageRank 
0-7695-2375-7
4
0.45
References 
Authors
12
5
Name
Order
Citations
PageRank
Heesook Choi11677.47
William Enck22832221.77
JaeSheung Shin3257.53
P. McDaniel47174494.57
Thomas F. La Porta5102591.82