Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol
نویسندگان
چکیده
We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models. These enhancements include a) Nodal Weighting (in addition to Link Weighting) in the reputation database, b) a network layer retransmission capability and c) modifications to the packet flow rates. These enhancements are meant to improve the learning rate of the protocol in the presence of various Byzantine Attack models. The attack models investigated include previously investigated models [4] and a new and effective attack model, termed the MAC-Level Attack. We investigate the dynamics of the ODSBR protocol and its enhancements through analytic models and extensive simulation studies. We find that the protocol enhancements improve the learning times of the ODSBR protocol. The Nodal Weighting enhancement specifically helps in the presence of the various colluding Byzantine Attack models investigated. However, the time to develop a relatively complete reputation database in the MANET context is found to be relatively large.
منابع مشابه
ODSBR: An On-Demand Secure Byzantine Routing Protocol
A common technique used by routing protocols for ad hoc wireless networks is to establish the routing paths on-demand, as opposed to continually maintaining a complete routing table. Since in an ad hoc network nodes not in direct range communicate via intermediate nodes, a significant concern is the ability to route in the presence of Byzantine failures which include nodes that drop, fabricate,...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملAn On-Demand Byzantine-Resilient Secure Routing Protocol for Wireless Adhoc Networks
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. We refer to any arbitrary action by authenticated nodes resulting in disruption of the routing service such as drop packets, modify packets and miss-route packets as Byzantine behavior, and to such an adversary as a Byzantine adversary. Nodes may exhibit Byzantine beh...
متن کاملMitigating Byzantine Attacks in Ad Hoc Wireless Networks
Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the network are referred to as Byzantine attacks. Traditional secure routing protocols are vulnerable to this class of attacks since they usually assume that once authenticated, a node can be trusted to execute the protocol correctly. We present a detailed description of several By...
متن کاملEvaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)
Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency on a fixed infrastructure. There have been many studies done in this area to improve the quality and efficiency of the routing protocols in MANETs. However unique characteristics of MANETs topology such as open peer-to-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006