Secure reporting of traffic forwarding activity in mobile ad hoc networks

Heesook Choi, William Enck, Jaesheung Shin, Patrick Drew McDaniel, Thomas F. La Porta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical to ensure proper network operation. These measurements are often used to credit nodes based on their level of participation, or to detect loss. Past solutions employ neighbor monitoring and reporting on node forwarding traffic. These methods are not applicable in civilian networks where neighbor nodes lack the desire or ability to perform the monitoring function. Such environments occur frequently in which neighbor hosts are resource constrained, or in networks where directional antennas are used and reliable monitoring is difficult or impossible. In this paper, we propose a protocol that uses nodes on the data path to securely produce packet forwarding reports. Reporting nodes are chosen randomly and secretly so that malicious nodes cannot modify their behavior based upon the monitoring point. The integrity and authenticity of reports are preserved through the use of secure link layer acknowledgments and monitoring reports. The robustness of the reporting mechanism is strengthened by forwarding the report to multiple destinations (source and destination). We explore the security, cost, and accuracy of our protocol.

Original languageEnglish (US)
Title of host publicationMobiQuitous 2005
Subtitle of host publicationSecond Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
Pages12-21
Number of pages10
DOIs
StatePublished - Dec 1 2005
EventMobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services - San Diego, CA, United States
Duration: Jul 17 2005Jul 21 2005

Publication series

NameMobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services

Other

OtherMobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
CountryUnited States
CitySan Diego, CA
Period7/17/057/21/05

Fingerprint

Mobile ad hoc networks
Monitoring
Antennas
Costs

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Choi, H., Enck, W., Shin, J., McDaniel, P. D., & La Porta, T. F. (2005). Secure reporting of traffic forwarding activity in mobile ad hoc networks. In MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services (pp. 12-21). [1540983] (MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services). https://doi.org/10.1109/MOBIQUITOUS.2005.53
Choi, Heesook ; Enck, William ; Shin, Jaesheung ; McDaniel, Patrick Drew ; La Porta, Thomas F. / Secure reporting of traffic forwarding activity in mobile ad hoc networks. MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services. 2005. pp. 12-21 (MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services).
@inproceedings{225a94fdf4fb4448bad9b368d998386a,
title = "Secure reporting of traffic forwarding activity in mobile ad hoc networks",
abstract = "Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical to ensure proper network operation. These measurements are often used to credit nodes based on their level of participation, or to detect loss. Past solutions employ neighbor monitoring and reporting on node forwarding traffic. These methods are not applicable in civilian networks where neighbor nodes lack the desire or ability to perform the monitoring function. Such environments occur frequently in which neighbor hosts are resource constrained, or in networks where directional antennas are used and reliable monitoring is difficult or impossible. In this paper, we propose a protocol that uses nodes on the data path to securely produce packet forwarding reports. Reporting nodes are chosen randomly and secretly so that malicious nodes cannot modify their behavior based upon the monitoring point. The integrity and authenticity of reports are preserved through the use of secure link layer acknowledgments and monitoring reports. The robustness of the reporting mechanism is strengthened by forwarding the report to multiple destinations (source and destination). We explore the security, cost, and accuracy of our protocol.",
author = "Heesook Choi and William Enck and Jaesheung Shin and McDaniel, {Patrick Drew} and {La Porta}, {Thomas F.}",
year = "2005",
month = "12",
day = "1",
doi = "10.1109/MOBIQUITOUS.2005.53",
language = "English (US)",
isbn = "0769523757",
series = "MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services",
pages = "12--21",
booktitle = "MobiQuitous 2005",

}

Choi, H, Enck, W, Shin, J, McDaniel, PD & La Porta, TF 2005, Secure reporting of traffic forwarding activity in mobile ad hoc networks. in MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services., 1540983, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services, pp. 12-21, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services, San Diego, CA, United States, 7/17/05. https://doi.org/10.1109/MOBIQUITOUS.2005.53

Secure reporting of traffic forwarding activity in mobile ad hoc networks. / Choi, Heesook; Enck, William; Shin, Jaesheung; McDaniel, Patrick Drew; La Porta, Thomas F.

MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services. 2005. p. 12-21 1540983 (MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Secure reporting of traffic forwarding activity in mobile ad hoc networks

AU - Choi, Heesook

AU - Enck, William

AU - Shin, Jaesheung

AU - McDaniel, Patrick Drew

AU - La Porta, Thomas F.

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical to ensure proper network operation. These measurements are often used to credit nodes based on their level of participation, or to detect loss. Past solutions employ neighbor monitoring and reporting on node forwarding traffic. These methods are not applicable in civilian networks where neighbor nodes lack the desire or ability to perform the monitoring function. Such environments occur frequently in which neighbor hosts are resource constrained, or in networks where directional antennas are used and reliable monitoring is difficult or impossible. In this paper, we propose a protocol that uses nodes on the data path to securely produce packet forwarding reports. Reporting nodes are chosen randomly and secretly so that malicious nodes cannot modify their behavior based upon the monitoring point. The integrity and authenticity of reports are preserved through the use of secure link layer acknowledgments and monitoring reports. The robustness of the reporting mechanism is strengthened by forwarding the report to multiple destinations (source and destination). We explore the security, cost, and accuracy of our protocol.

AB - Nodes forward data on behalf of each other in mobile ad hoc networks. In a civilian application, nodes are assumed to be selfish and rational, i.e., they pursue their own self-interest. Hence, the ability to accurately measure traffic forwarding is critical to ensure proper network operation. These measurements are often used to credit nodes based on their level of participation, or to detect loss. Past solutions employ neighbor monitoring and reporting on node forwarding traffic. These methods are not applicable in civilian networks where neighbor nodes lack the desire or ability to perform the monitoring function. Such environments occur frequently in which neighbor hosts are resource constrained, or in networks where directional antennas are used and reliable monitoring is difficult or impossible. In this paper, we propose a protocol that uses nodes on the data path to securely produce packet forwarding reports. Reporting nodes are chosen randomly and secretly so that malicious nodes cannot modify their behavior based upon the monitoring point. The integrity and authenticity of reports are preserved through the use of secure link layer acknowledgments and monitoring reports. The robustness of the reporting mechanism is strengthened by forwarding the report to multiple destinations (source and destination). We explore the security, cost, and accuracy of our protocol.

UR - http://www.scopus.com/inward/record.url?scp=33749515007&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33749515007&partnerID=8YFLogxK

U2 - 10.1109/MOBIQUITOUS.2005.53

DO - 10.1109/MOBIQUITOUS.2005.53

M3 - Conference contribution

AN - SCOPUS:33749515007

SN - 0769523757

SN - 9780769523750

T3 - MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services

SP - 12

EP - 21

BT - MobiQuitous 2005

ER -

Choi H, Enck W, Shin J, McDaniel PD, La Porta TF. Secure reporting of traffic forwarding activity in mobile ad hoc networks. In MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services. 2005. p. 12-21. 1540983. (MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services). https://doi.org/10.1109/MOBIQUITOUS.2005.53