AK-PPM: An authenticated packet attribution scheme for mobile ad hoc networks

Zhi Xu, Hungyuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Packet traceback in mobile ad hoc networks (MANETs) is a technique for identifying the source and intermediaries of a packet forwarding path. While many IP traceback techniques have been introduced for packet attribution in the Internet, they are not directly applicable in MANETs due to unique challenges of MANET environments. In this work, we make the first effort to quantitatively analyze the impacts of node mobility, attack packet rate, and path length on the traceability of two types of well-known IP traceback schemes: probabilistic packet marking (PPM) and hash-based logging. We then present the design of an authenticated K-sized Probabilistic Packet Marking (AK-PPM) scheme, which not only improves the effectiveness of source traceback in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve asymptotically one-hop precise, and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.

Original languageEnglish (US)
Title of host publicationResearch in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings
Pages147-168
Number of pages22
DOIs
StatePublished - Oct 30 2012
Event15th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2012 - Amsterdam, Netherlands
Duration: Sep 12 2012Sep 14 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7462 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other15th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2012
CountryNetherlands
CityAmsterdam
Period9/12/129/14/12

Fingerprint

Mobile ad hoc networks
Mobile Ad Hoc Networks
Path
Traceability
Performance Measurement
Path Length
Analytical Model
Authentication
Analytical models
Attack
Internet
Vertex of a graph
Simulation

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Xu, Z., Hsu, H., Chen, X., Zhu, S., & Hurson, A. R. (2012). AK-PPM: An authenticated packet attribution scheme for mobile ad hoc networks. In Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings (pp. 147-168). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7462 LNCS). https://doi.org/10.1007/978-3-642-33338-5_8
Xu, Zhi ; Hsu, Hungyuan ; Chen, Xin ; Zhu, Sencun ; Hurson, Ali R. / AK-PPM : An authenticated packet attribution scheme for mobile ad hoc networks. Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings. 2012. pp. 147-168 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{03a527b3f3124e60a62f787d11d0ee6f,
title = "AK-PPM: An authenticated packet attribution scheme for mobile ad hoc networks",
abstract = "Packet traceback in mobile ad hoc networks (MANETs) is a technique for identifying the source and intermediaries of a packet forwarding path. While many IP traceback techniques have been introduced for packet attribution in the Internet, they are not directly applicable in MANETs due to unique challenges of MANET environments. In this work, we make the first effort to quantitatively analyze the impacts of node mobility, attack packet rate, and path length on the traceability of two types of well-known IP traceback schemes: probabilistic packet marking (PPM) and hash-based logging. We then present the design of an authenticated K-sized Probabilistic Packet Marking (AK-PPM) scheme, which not only improves the effectiveness of source traceback in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve asymptotically one-hop precise, and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.",
author = "Zhi Xu and Hungyuan Hsu and Xin Chen and Sencun Zhu and Hurson, {Ali R.}",
year = "2012",
month = "10",
day = "30",
doi = "10.1007/978-3-642-33338-5_8",
language = "English (US)",
isbn = "9783642333378",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "147--168",
booktitle = "Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings",

}

Xu, Z, Hsu, H, Chen, X, Zhu, S & Hurson, AR 2012, AK-PPM: An authenticated packet attribution scheme for mobile ad hoc networks. in Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7462 LNCS, pp. 147-168, 15th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2012, Amsterdam, Netherlands, 9/12/12. https://doi.org/10.1007/978-3-642-33338-5_8

AK-PPM : An authenticated packet attribution scheme for mobile ad hoc networks. / Xu, Zhi; Hsu, Hungyuan; Chen, Xin; Zhu, Sencun; Hurson, Ali R.

Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings. 2012. p. 147-168 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7462 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - AK-PPM

T2 - An authenticated packet attribution scheme for mobile ad hoc networks

AU - Xu, Zhi

AU - Hsu, Hungyuan

AU - Chen, Xin

AU - Zhu, Sencun

AU - Hurson, Ali R.

PY - 2012/10/30

Y1 - 2012/10/30

N2 - Packet traceback in mobile ad hoc networks (MANETs) is a technique for identifying the source and intermediaries of a packet forwarding path. While many IP traceback techniques have been introduced for packet attribution in the Internet, they are not directly applicable in MANETs due to unique challenges of MANET environments. In this work, we make the first effort to quantitatively analyze the impacts of node mobility, attack packet rate, and path length on the traceability of two types of well-known IP traceback schemes: probabilistic packet marking (PPM) and hash-based logging. We then present the design of an authenticated K-sized Probabilistic Packet Marking (AK-PPM) scheme, which not only improves the effectiveness of source traceback in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve asymptotically one-hop precise, and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.

AB - Packet traceback in mobile ad hoc networks (MANETs) is a technique for identifying the source and intermediaries of a packet forwarding path. While many IP traceback techniques have been introduced for packet attribution in the Internet, they are not directly applicable in MANETs due to unique challenges of MANET environments. In this work, we make the first effort to quantitatively analyze the impacts of node mobility, attack packet rate, and path length on the traceability of two types of well-known IP traceback schemes: probabilistic packet marking (PPM) and hash-based logging. We then present the design of an authenticated K-sized Probabilistic Packet Marking (AK-PPM) scheme, which not only improves the effectiveness of source traceback in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve asymptotically one-hop precise, and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.

UR - http://www.scopus.com/inward/record.url?scp=84867860249&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84867860249&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-33338-5_8

DO - 10.1007/978-3-642-33338-5_8

M3 - Conference contribution

AN - SCOPUS:84867860249

SN - 9783642333378

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 147

EP - 168

BT - Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings

ER -

Xu Z, Hsu H, Chen X, Zhu S, Hurson AR. AK-PPM: An authenticated packet attribution scheme for mobile ad hoc networks. In Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings. 2012. p. 147-168. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-33338-5_8