Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node.
Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node.
Network Node Authentication by Wireless Signal Overhearing
YÜKSEL, YUSUF TAYLAN
2021/2022
Abstract
Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node.File | Dimensione | Formato | |
---|---|---|---|
Thesis - YusufTaylanYuksel - NetworkNodeAuthenticationByWirelessSignalOverhearing.pdf
accesso aperto
Dimensione
3.2 MB
Formato
Adobe PDF
|
3.2 MB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/33162