Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks

Cong Pu, Sunho Lim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

19 Scopus citations

Abstract

Selective forwarding attack is one of well-known denial-of-service (DoS) attacks, and designing its countermeasure is critical and challenging. Detecting a forwarding misbehavior in multi-hop networks is non-trivial because it is hard to filter from node failure or packet collision. This paper proposes a new countermeasure, called camouflage-based active detection, in a rapidly emerging energy harvesting motivated networks (EHNets), where a set of self-sustainable nodes communicate directly or indirectly via multi-hop relays. Four adversarial scenarios motivated by energy harvesting and their potential forwarding vulnerabilities are analyzed. Each node actively disguises itself as an energy harvesting node, monitors any forwarding operation, and detects forwarding misbehaviors of lurk deep malicious nodes in EHNets. Extensive simulation experiments using OMNeT++ show that the proposed approach is highly detection-efficient compared to a hop-by-hop cooperative detection scheme in terms of detection latency and detection rate.

Original languageEnglish
Title of host publication2015 IEEE Military Communications Conference, MILCOM 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages903-908
Number of pages6
ISBN (Electronic)9781509000739
DOIs
StatePublished - Dec 14 2015
Event34th Annual IEEE Military Communications Conference, MILCOM 2015 - Tampa, United States
Duration: Oct 26 2015Oct 28 2015

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2015-December

Conference

Conference34th Annual IEEE Military Communications Conference, MILCOM 2015
CountryUnited States
CityTampa
Period10/26/1510/28/15

Keywords

  • Camouflage-based active detection
  • denial-ofservice (DoS)
  • energy harvesting motivated network
  • selective forwarding attack

Fingerprint Dive into the research topics of 'Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks'. Together they form a unique fingerprint.

Cite this