2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks 2008
DOI: 10.1109/sahcn.2008.87
|View full text |Cite
|
Sign up to set email alerts
|

Reactive Identification of Misbehavior in Ad Hoc Networks Based on Random Audits

Abstract: We address the problem of identifying misbehaving nodes that (selectively) drop packets, in order to degrade the network performance. Such nodes may agree to forward packets by participating in the route discovery process, but refuse to do so once the packets have been received. We propose a reactive approach where the source initiates an audit process if a significant performance degradation is observed. We employ a compact representation of the behavioral proof of a node by adopting Bloom filter structures a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 26 publications
(36 citation statements)
references
References 10 publications
0
35
0
Order By: Relevance
“…In our previous work [18], we proposed REAct, a reactive misbehavior identification scheme relying on audits. In REAct, the destination periodically sends acknowledgments to the source indicating the performance on the route.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In our previous work [18], we proposed REAct, a reactive misbehavior identification scheme relying on audits. In REAct, the destination periodically sends acknowledgments to the source indicating the performance on the route.…”
Section: Related Workmentioning
confidence: 99%
“…The audit mechanism is adopted from [18] and is based on the compact representation of a membership set via Bloom filters [4]. The goal of auditing a node n i ∈ P SD is to force n i to commit to the set of packets X i that it received and forwarded to the next hop.…”
Section: The Audit Mechanismmentioning
confidence: 99%
See 2 more Smart Citations
“…Based on this methodology used to identify the attacking nodes, these works can be further classified into four sub categories. Creating system, Reputation system, End to end or hop to hop [3] acknowledgement and Cryptographic methods [4]. A credit system [1] provides intensive for cooperation .A node receives credit by relaying packets for others, and uses its credit to send its own packets.…”
Section: Introductionmentioning
confidence: 99%