Adversary Games in Secure/Reliable Network Routing
نویسندگان
چکیده
In this paper, we consider security aspects of network routing in a game-theoretic framework where an attacker is empowered with an ability for intrusion into edges of the network; on the other hand, the goal of designer is to choose routing paths. We interpret the secure routing problem as a two player zero sum game. The attacker can choose one or more edges for intrusion, while the designer has to choose paths between source-destination pairs for a given set of pairs. We give polynomial-time algorithms for finding mixed Nash equilibria if 1) the attacker is limited to a one-edge attack, 2) the designer has two source-destination pairs while the attacker is either limited to c edges, for given c, or the attacker incurs a cost for each edge attacked. Previous work gave an algorithm for one source-destination pair and multiple edge attacks.
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملUC-Secure Source Routing Protocol
The multi-path routing scheme provides reliable guarantee for mobile ad hoc network. A new method is proposed that is using to analyze the security of multi-path routing protocol within the framework of Universally Composable (UC) security. Based on the topological model that there exist adversarial nodes, the concept of plausible route is extended and the definition of plausible-route set is p...
متن کاملSERCID: A Secure Mechanism for Data Collection in Wireless Sensor Networks
The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. An adversary can physically compromise a subset of sensor nodes in a wireless sensor network to eavesdrop information. Due to some intrinsic features of wireless sensor network, it is difficult to perform efficient intrusion detection against malicious nodes in such a resource-restricted environme...
متن کاملA New Framework for Secure Routing in VANET
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011