TY - GEN
T1 - AK-PPM
T2 - 15th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2012
AU - Xu, Zhi
AU - Hsu, Hungyuan
AU - Chen, Xin
AU - Zhu, Sencun
AU - Hurson, Ali R.
PY - 2012
Y1 - 2012
N2 - Packet traceback in mobile ad hoc networks (MANETs) is a technique for identifying the source and intermediaries of a packet forwarding path. While many IP traceback techniques have been introduced for packet attribution in the Internet, they are not directly applicable in MANETs due to unique challenges of MANET environments. In this work, we make the first effort to quantitatively analyze the impacts of node mobility, attack packet rate, and path length on the traceability of two types of well-known IP traceback schemes: probabilistic packet marking (PPM) and hash-based logging. We then present the design of an authenticated K-sized Probabilistic Packet Marking (AK-PPM) scheme, which not only improves the effectiveness of source traceback in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve asymptotically one-hop precise, and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.
AB - Packet traceback in mobile ad hoc networks (MANETs) is a technique for identifying the source and intermediaries of a packet forwarding path. While many IP traceback techniques have been introduced for packet attribution in the Internet, they are not directly applicable in MANETs due to unique challenges of MANET environments. In this work, we make the first effort to quantitatively analyze the impacts of node mobility, attack packet rate, and path length on the traceability of two types of well-known IP traceback schemes: probabilistic packet marking (PPM) and hash-based logging. We then present the design of an authenticated K-sized Probabilistic Packet Marking (AK-PPM) scheme, which not only improves the effectiveness of source traceback in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve asymptotically one-hop precise, and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.
UR - http://www.scopus.com/inward/record.url?scp=84867860249&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84867860249&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-33338-5_8
DO - 10.1007/978-3-642-33338-5_8
M3 - Conference contribution
AN - SCOPUS:84867860249
SN - 9783642333378
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 147
EP - 168
BT - Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Proceedings
Y2 - 12 September 2012 through 14 September 2012
ER -