security and cooperation in ad hoc networks gaia maselli iit - cnr [email protected]
TRANSCRIPT
![Page 1: Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR gaia.maselli@iit.cnr.it](https://reader036.vdocument.in/reader036/viewer/2022082821/5697bff01a28abf838cbaad9/html5/thumbnails/1.jpg)
Security and Cooperation in Security and Cooperation in Ad Hoc NetworksAd Hoc Networks
Gaia MaselliIIT - [email protected]
![Page 2: Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR gaia.maselli@iit.cnr.it](https://reader036.vdocument.in/reader036/viewer/2022082821/5697bff01a28abf838cbaad9/html5/thumbnails/2.jpg)
The availability problemThe availability problem
Problem: how to avoid that some nodes misbehave
to find out a mechanism to detect and isolate misbehaving nodes
Cooperation misbehavior• Malicious misbehavior: intentional DoS attack• Selfishness: no routing/forwarding to save resources
![Page 3: Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR gaia.maselli@iit.cnr.it](https://reader036.vdocument.in/reader036/viewer/2022082821/5697bff01a28abf838cbaad9/html5/thumbnails/3.jpg)
Current approachesCurrent approaches
Watchdog + Reputation system Watchdog weaknesses: a node might not detect a
misbehaving node in presence of
– collisions
– no homogeneous transmission ranges Drawbacks of cooperation in security mechanisms
– overhead (additional traffic)
– wrong accusations spreading
![Page 4: Security and Cooperation in Ad Hoc Networks Gaia Maselli IIT - CNR gaia.maselli@iit.cnr.it](https://reader036.vdocument.in/reader036/viewer/2022082821/5697bff01a28abf838cbaad9/html5/thumbnails/4.jpg)
A different approach?A different approach?
New challenges– Detection of misbehaving nodes without watchdog
– No spreading of false information
??