KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks

Abstract Wireless Community Networks (WCN) are crowdsourced networks where equipment is contributed and managed by members from a community. WCN have three intrinsic characteristics that make forwarding faults more likely: inexpensive equipment, non-expert administration and openness. These characteristics hinder the robustness of network connectivity. We present KDet, a decentralized protocol for the detection of forwarding faults by establishing overlapping logical boundaries that monitor the behavior of the routers within them. KDet is designed to be collusion resistant, ensuring that compromised routers cannot cover for others to avoid detection. Another important characteristic of KDet is that it does not rely on path information: monitoring nodes do not have to know the complete path a packet follows, just the previous and next hop. As a result, KDet can be deployed as an independent daemon without imposing any change in the network, and it will bring improved network robustness. Results from theoretical analysis and simulation show the correctness of the algorithm, its accuracy in detecting forwarding faults, and a comparison in terms of cost and advantages over previous work, that confirms its practical feasibility in WCN.

[1]  Bart Braem,et al.  A questionnaire based examination of community networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[2]  Leandro Navarro-Moldes,et al.  Tight bounds for sketches in traffic validation , 2017, 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC).

[3]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[4]  Sharon Goldberg,et al.  Path-quality monitoring in the presence of adversaries , 2008, SIGMETRICS '08.

[5]  Hsu-Chun Hsiao,et al.  Securing data planes in software-defined networks , 2016, 2016 IEEE NetSoft Conference and Workshops (NetSoft).

[6]  Leandro Navarro-Moldes,et al.  Guifi.net, a Crowdsourced Network Infrastructure Held in Common , 2015, Comput. Networks.

[7]  Filip Maly,et al.  Troubleshooting Assistance Services in Community Wireless Networks , 2012, J. Comput. Networks Commun..

[8]  Stefan Savage,et al.  Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.

[9]  Winston Khoon Guan Seah,et al.  Cooperation stimulation mechanisms for wireless multihop networks: A survey , 2015, J. Netw. Comput. Appl..

[10]  Xin Zhang,et al.  Secure and Scalable Fault Localization under Dynamic Traffic Patterns , 2012, 2012 IEEE Symposium on Security and Privacy.

[11]  Stefan Savage,et al.  Detecting Malicious Packet Losses , 2009, IEEE Transactions on Parallel and Distributed Systems.

[12]  Adrian Perrig,et al.  High-Speed Inter-Domain Fault Localization , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[13]  Reza Curtmola,et al.  ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.

[14]  Leandro Navarro-Moldes,et al.  A technological overview of the guifi.net community network , 2015, Comput. Networks.

[15]  Srikanth V. Krishnamurthy,et al.  Forensic Analysis of Packet Losses in Wireless Networks , 2012, IEEE/ACM Transactions on Networking.

[16]  Florin Rusu,et al.  Statistical analysis of sketch estimators , 2007, SIGMOD '07.

[17]  Francesco Chiti,et al.  A broadband wireless communications system for emergency management , 2008, IEEE Wireless Communications.

[18]  Renato Lo Cigno,et al.  A week in the life of three large Wireless Community Networks , 2015, Ad Hoc Networks.

[19]  Jennifer Rexford,et al.  Stealth Probing: Efficient Data-Plane Security for IP Routing , 2006, USENIX Annual Technical Conference, General Track.

[20]  Marwan Krunz,et al.  Detection of malicious packet dropping in wireless ad hoc networks based on privacy-preserving public auditing , 2012, WISEC '12.

[21]  Mario Gerla,et al.  Fisheye state routing: a routing scheme for ad hoc wireless networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[22]  Katerina J. Argyraki,et al.  Loss and Delay Accountability for the Internet , 2007, 2007 IEEE International Conference on Network Protocols.

[23]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[24]  Stefan Savage,et al.  Fatih: detecting and isolating malicious routers , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[25]  Axel Franz Neumann,et al.  Cooperation in open, decentralized, and heterogeneous computer networks , 2017 .

[26]  David L. Johnson,et al.  "Community Networks" in the African Context: Opportunities and Barriers , 2016, AfriCHI.

[27]  Biswanath Mukherjee,et al.  Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[28]  Cristina Nita-Rotaru,et al.  Practical Intrusion-Tolerant Networks , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).