Files in this item



application/pdfMobi-Herald Ale ... Mobile Ad Hoc Networks.pdf (332kB)
(no description provided)PDF


Title:Mobi-Herald: Alert Propagation in Mobile Ad Hoc Networks
Author(s):He, Wenbo; Huang, Ying; Nahrstedt, Klara; Lee, Whay C.
Subject(s):mobile ad hoc networks
ad hoc networks
Abstract:Intrusion/misbehavior detection and response are two important components for defending against various attacks in mobile ad hoc networks. Unfortunately, there is a gap between local intrusion/misbehavior detection and network-wide response in such networks. To bridge this gap, alert propagation, aiming to spread alert messages to the whole network upon detection of malicious/abnormal activity, is a viable solution but has been overlooked. Epidemic routing schemes are available to propagate messages to the entire network. However, alert propagation cannot simply rely on epidemic routing schemes only, because these schemes can be utilized by malicious nodes (slanderers) to defame other network nodes to issue DoS attacks. In this paper, we present a novel protocol for alert propagation, called Mobi-Herald. To achieve high coverage of message delivery, we design a novel mobility-assisted epidemic routing scheme to propagate alert messages efficiently. To defend against slander attack, our Mobi-Herald alert propagation scheme adopts threshold-based verification against collusive slanderers. To ensure transmission efficiency, we use control parameter times-to-send (TTS) to limit unnecessary transmissions. We evaluate the Mobi-Herald alert propagation protocol through both theoretical analysis and simulation. We conclude that Mobi-Herald achieves excellent coverage of message delivery with small message overhead and reasonable alert propagation delay.
Issue Date:2007-03
Genre:Technical Report
Other Identifier(s):UIUCDCS-R-2007-2825
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-21

This item appears in the following Collection(s)

Item Statistics