S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, P. Bose, A. Bakshi
{"title":"基于二进制搜索的无线自组网选择性转发攻击检测","authors":"S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, P. Bose, A. Bakshi","doi":"10.1109/EAIT.2012.6407978","DOIUrl":null,"url":null,"abstract":"Selective forwarding attack is one of the most harmful attacks in wireless networks. This paper proposes an algorithm to defend against selective forwarding attacks based on binary search technique in clustered wireless ad hoc network. In the first phase, the cluster head raises an alarm when number of packets dropped along a path is more than a threshold value. In the second phase, control packets and hello packets are exchanged along a misbehaving routing path between the wireless node and a cluster head to detect compromised node. Experimental results demonstrate that the detection efficiency of the proposed algorithm is more than 90%. The algorithm can detect multiple compromised nodes if they exist. We have also experimented to estimate the threshold value of packet drops and computed the required rate of drops of compromised nodes so that they can be detected.","PeriodicalId":194103,"journal":{"name":"2012 Third International Conference on Emerging Applications of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Detection of selective forwarding attack in wireless ad hoc networks using binary search\",\"authors\":\"S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, P. Bose, A. Bakshi\",\"doi\":\"10.1109/EAIT.2012.6407978\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Selective forwarding attack is one of the most harmful attacks in wireless networks. This paper proposes an algorithm to defend against selective forwarding attacks based on binary search technique in clustered wireless ad hoc network. In the first phase, the cluster head raises an alarm when number of packets dropped along a path is more than a threshold value. In the second phase, control packets and hello packets are exchanged along a misbehaving routing path between the wireless node and a cluster head to detect compromised node. Experimental results demonstrate that the detection efficiency of the proposed algorithm is more than 90%. The algorithm can detect multiple compromised nodes if they exist. We have also experimented to estimate the threshold value of packet drops and computed the required rate of drops of compromised nodes so that they can be detected.\",\"PeriodicalId\":194103,\"journal\":{\"name\":\"2012 Third International Conference on Emerging Applications of Information Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Third International Conference on Emerging Applications of Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EAIT.2012.6407978\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Emerging Applications of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EAIT.2012.6407978","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of selective forwarding attack in wireless ad hoc networks using binary search
Selective forwarding attack is one of the most harmful attacks in wireless networks. This paper proposes an algorithm to defend against selective forwarding attacks based on binary search technique in clustered wireless ad hoc network. In the first phase, the cluster head raises an alarm when number of packets dropped along a path is more than a threshold value. In the second phase, control packets and hello packets are exchanged along a misbehaving routing path between the wireless node and a cluster head to detect compromised node. Experimental results demonstrate that the detection efficiency of the proposed algorithm is more than 90%. The algorithm can detect multiple compromised nodes if they exist. We have also experimented to estimate the threshold value of packet drops and computed the required rate of drops of compromised nodes so that they can be detected.