Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node.

Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node.

Network Node Authentication by Wireless Signal Overhearing

YÜKSEL, YUSUF TAYLAN
2021/2022

Abstract

Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node.
2021
Network Node Authentication by Wireless Signal Overhearing
Ad hoc networks are infrastructure-less networks that are not based on a center. The absence of centralized control raises some doubts about having a secure data transfer. We assume a wireless network where the nodes are connected with a given probability and data packet transmission over the next hop nodes starting from a Source Node (SN) to a Destination Node (DN). Some packets can be modified, corrupted, or forwarded by a node outside of the route in a data packet transfer. To detect this, we propose an authentication solution for the transmitting nodes each time they transmit a data packet to the next hop node. Since the data transmission signal can be heard by some nodes in a transmission range, any nearby node can also receive the same packet. Thus, it can verify whether the transmitted packet came from a real transmitting node. The solution aims to detect misbehaving nodes and cut them off from future packet transfers on the expected packet route. Additionally, it sends an alarm packet to the DN to warn that the incoming data packet was transmitted by an illegal node.
Wireless Network
Authentication
Data Analysis
File in questo prodotto:
File Dimensione Formato  
Thesis - YusufTaylanYuksel - NetworkNodeAuthenticationByWirelessSignalOverhearing.pdf

accesso aperto

Dimensione 3.2 MB
Formato Adobe PDF
3.2 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/33162