Security-Aware Topology Control for Wireless Ad-hoc Networks

被引:1
作者
Galiotos, Panagiotis [1 ]
机构
[1] Univ So Calif, Sch Elect Engn, Los Angeles, CA 90089 USA
来源
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE | 2008年
关键词
topology control; security-aware; hypothesis testing; ad-hoc networks; Byzantine generals algorithm;
D O I
10.1109/GLOCOM.2008.ECP.151
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a security-aware topology control scheme for wireless ad-hoc networks. The proposed topology algorithm builds a connected network based on the security level of each node, in the presence of a security threat such as the Denial of Service attack. The existing topology control schemes are primarily concentrated on optimizing parameters such as the energy consumption, while maintaining a satisfying connectivity level. Security issues are usually addressed on higher layers. This approach demands significant amount of energy and processing power from the participating entities and increases the complexity. Our work extends the topology control schemes by making security the primary concern. First we detect the nodes that participate in a DoS attack. Then we introduce the Reputation metric that quantifies the results of this detection. Finally, we use this metric as the edge weight in the Local Minimum Spanning Tree algorithm that builds a connected topology. Hence we can isolate the malicious nodes and exclude them if they are already part of the topology and thus create a secure wireless network. The proposed scheme can also be integrated in any of the existing topology control algorithms. Our main contributions are: a probabilistic model for detecting and isolating the malicious nodes that participate in a Denial of Service attack a lightweight reputation metric that quantifies the results of the detection phase a modified local minimum spanning tree algorithm, that performs topology formation and creates a connected and secure network We also provide the convergence analysis for the detection scheme.
引用
收藏
页数:6
相关论文
共 12 条
[1]  
ABDELMALEK M, P ACM SOSP 2005
[2]  
BAEK W, P IEEE WCNC 2006
[3]  
CASTRO M, OSDI 1999
[4]  
DOLEV D, 1982, INFORM CONTROL, V52
[5]  
KHALIL I, IEEE SECURECOMM 2005
[6]  
KIM Y, 2005, ATTENTION ATTACKER T
[7]  
KURSAWE K, SRDS 2002
[8]  
LAMPORT L, 1982, ACM TOPLAS, V4
[9]  
LI N, P IEEE INF 2003
[10]  
LOU W, 2002, IEEE T MOBILE CO APR