Open Access Open Access  Restricted Access Subscription or Fee Access

Malicious Packet Dropping Detection in Wireless Ad Hoc Networks based on Public Auditing Architecture

P.D. Mithun Dev, Anju Augustin


Malicious package shedding and link error are usually a pair of sources for packet failures in wireless ad hoc networks. In this particular paper, while observing a sequence of packet failures in wireless ad hoc network, we are interested in identifying if the failures are usually due to link errors only, or because of the merged effect of link errors and malicious fall. We are in particular focussed on the insider-attack case, where malicious nodes which are part of a path take advantage of its knowledge for selectively dropping a small amount of packets critical for the system.  Since the packet shedding rate throughout this specific case is just like the actual channel error rate, conventional algorithms that use actual packet shedding rate cannot obtain acceptable detection precision. To enhance the actual detection precision, we propose to take advantage of the actual correlations concerning missing packets. Also, to make sure trustworthy calculations of the correlations, we employ a homomorphic linear authenticator (HLA) centered public auditing structure that enables the sensor to confirm the honesty of the packet shedding information reported by individual nodes. This development is privateness conserving, collusion proof, and also incurs reduced communication and storage overheads. With the use of comprehensive models, we confirm that the suggested scheme obtain substantially far better detection precision when compared with conventional strategies.


Packet Dropping, Secure Routing, Attack Detection, Homomorphic Linear Signature, Auditing.

Full Text:



V. N. Padmanabhan and D. R. Simon. Secure traceroute to detect faulty or malicious routing. In Proceedings of the ACM SIGCOMM Conference, 2003.

K. Liu, J. Deng, P. Varshney, and K. Balakrishnan. An acknowledgement-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5):536 –550, May 2006.

G. Ateniese, S. Kamara, and J. Katz. Proofs of storage from homomorphic identification protocols. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2009.

W. Galuba, P. Papadimitratos, M. Poturalski, K. Aberer, Z. Despotovic, and W. Kellerer. Castor: Scalable secure routing for ad hoc networks. In INFOCOM, 2010 Proceedings IEEE, pages 1 –9, march 2010.

S. Buchegger and J. Y. L. Boudec. Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad-hoc networks). In Proceedings of the ACM MobiHoc Conference, 2002.

S. Zhong, J. Chen, and Y. R. Yang. Sprite: a simple cheat-proof, creditbased system for mobile ad-hoc networks. In Proceedings of the IEEE INFOCOM Conference, pages 1987–1997, 2003.

J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring. Modelling incentives for collaboration in mobile ad hoc networks. In Proceedings of WiOpt, 2003.

J. Eriksson, M. Faloutsos, and S. Krishnamurthy. Routing amid colluding attackers. 2007.

L. Buttyan and J. P. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications, 8(5):579–592, Oct. 2003.

Q. He, D. Wu, and P. Khosla. Sori: a secure and objective reputationbased incentive scheme for ad hoc networks. In Proceedings of the IEEE WCNC Conference, 2004.

C. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 598–610, Oct. 2007.

H. Shacham and B. Waters. Compact proofs of retrievability. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), Dec. 2008.

A. Proano and L. Lazos. Selective jamming attacks in wireless networks. In Proceedings of the IEEE ICC Conference, pages 1–6, 2010.

A. Proano and L. Lazos. Packet-hiding methods for preventing selective jamming attacks. IEEE Transactions on Dependable and Secure Computing, 9(1):101–114, 2012.

G. Noubir and G. Lin. Low-power DoS attacks in data wirele lans and countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3):29–30, July 2003.

K. Balakrishnan, J. Deng, and P. K. Varshney. TWOACK: preventing selfishness in mobile ad hoc networks. In Proceedings of the IEEE WCNC Conference, 2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.