When Watchdog Meets Coding II 1
نویسندگان
چکیده
In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium and have nodes monitor their neighborhood. We call such nodes the Watchdogs. We propose a lightweight misbehavior detection scheme which integrates the idea of watchdogs and error detection coding. We show that even if the watchdog can only observe a fraction of packets, by choosing the encoder properly, an attacker will be detected with high probability while achieving throughput arbitrarily close to optimal. Such properties reduce the incentive for the attacker to attack. We then consider the problem of locating the misbehaving node and propose a simple protocol, which correctly locates the misbehaving node with high probability. The protocol requires exactly two watchdogs per unreliable relay node.
منابع مشابه
An algebraic watchdog for wireless network coding Citation
In this paper, we propose a scheme, called the algebraic watchdog for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global self-checking network. Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an a...
متن کاملFair Packet Forwarding in MANETs with Anonymous Stations: A Game-Theoretic Approach
A station of a mobile ad-hoc network (MANET) may selfishly refuse to forward transit packets as it shortens the battery life and takes up a portion of the bandwidth that could be used for source packets. Due to a high degree of station anonymity, selfishness meets with little punishment. The well-known watchdog mechanism can be used to check if an adjacent station forwards packets. We point out...
متن کاملTrisections and Totally Real Origami
1. CONSTRUCTIONS IN GEOMETRY. The study of methods that accomplish trisections is vast and extends back in time approximately 2300 years. My own favorite method of trisection from the Ancients is due to Archimedes, who performed a “neusis” between a circle and line. Basically a neusis (or use of a marked ruler) allows the marking of points on constructed objects of unit distance apart using a r...
متن کاملTopological Duality and Lattice Expansions Part II: Lattice Expansions with Quasioperators
Lattices have many applications in mathematics and logic, in which they occur together with additional operations. For example, in applications of Hilbert spaces, one is often concerned with the lattice of closed subspaces of a fixed space. This lattice is not distributive, but there is an operation taking a given subspace to its orthogonal subspace. More generally, ortholattices are lattices w...
متن کاملWatchdog Intrusion Detection Systems: Are They Feasible in MANETs?
Watchdogs are the basis of di erent Intrusion Detection Systems. They have the advantage of using only local information and therefore, they are robust to most of the attacks. Although importance of this mechanism is clear, it is hard to nd studies that seriously test the watchdog in wireless mobile scenarios with high degrees of mobility, a characteristic of any Mobile Ad Hoc Network (MANET). ...
متن کامل