4th International ICST Conference on Security and Privacy in Communication Networks

Research Article

MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-hop Wireless Ad Hoc Networks

  • @INPROCEEDINGS{10.1145/1460877.1460913,
        author={Issa Khalil and Saurabh Bagchi},
        title={MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-hop Wireless Ad Hoc Networks},
        proceedings={4th International ICST Conference on Security and Privacy in Communication Networks},
        publisher={ACM},
        proceedings_a={SECURECOMM},
        year={2008},
        month={9},
        keywords={Packet dropping multi-hop wireless networks local monitoring misrouting transmission power control},
        doi={10.1145/1460877.1460913}
    }
    
  • Issa Khalil
    Saurabh Bagchi
    Year: 2008
    MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-hop Wireless Ad Hoc Networks
    SECURECOMM
    ACM
    DOI: 10.1145/1460877.1460913
Issa Khalil1,*, Saurabh Bagchi2,*
  • 1: College of Information Technology United Arab Emirates University, UAE
  • 2: Dependable Computing Systems Lab (DCSL) School of Electrical & Computer Engineering Purdue University, USA
*Contact email: ikhalil@uaeu.ac.ae, sbagchi@purdue.edu

Abstract

Local monitoring has been demonstrated as a powerful technique for mitigating security attacks in multi-hop ad-hoc networks. In local monitoring, nodes overhear partial neighborhood communication to detect misbehavior such as packet drop or delay. However, local monitoring as presented in the literature is vulnerable to a class of attacks that we introduce here called stealthy packet dropping. Stealthy packet dropping disrupts the packet from reaching the destination by malicious behavior at an intermediate node. However, the malicious node gives the impression to its neighbors that it performed the legitimate forwarding action. Moreover, a legitimate node comes under suspicion. We introduce four ways of achieving stealthy packet dropping, none of which is currently detectable. We provide a protocol called MISPAR based on local monitoring to remedy each attack. It presents two techniques – having the neighbors maintain additional information about the routing path, and adding some checking responsibility to each neighbor. We show through analysis and simulation that the basic local monitoring fails to mitigate any of the presented attacks while MISPAR successfully mitigates them.