Reliable Routing Protocols in Networks with Byzantine Failures
نویسنده
چکیده
The network layer in a computer network is responsible for providing a datagram service, in which a packet issued from a source node to a destination node is expected to reach the destination node in a reasonably short period of time with some probability. The datagram service does not provide delivery guarantees: these are expected to be provided by a higher level transport layer, on top of a basic datagram service. But in order to design a reasonably efficient transport layer on top of a datagram service, the datagram service should provide the advertised service with high probability. The network layer functionality is typically provided by routers connected by links. These routers implement a protocol, which can be considered to be a distributed algorithm: each router performs the algorithm locally, operating on local data stored in local data structures, and the overall result is a global pattern of behavior. Many widely used routing algorithms are robust in the presence of simple failures (e.g. a router crashes and stops working completely, or a link goes down). However, a router with a Byzantine failure may act arbitrarily or even maliciously. We outline two network layer protocols that can route successfully in the presence of Byzantine failures as described in [2].
منابع مشابه
ODSBR: An On-Demand Secure Byzantine Routing Protocol
A common technique used by routing protocols for ad hoc wireless networks is to establish the routing paths on-demand, as opposed to continually maintaining a complete routing table. Since in an ad hoc network nodes not in direct range communicate via intermediate nodes, a significant concern is the ability to route in the presence of Byzantine failures which include nodes that drop, fabricate,...
متن کاملCERIAS Tech Report 2005-121 ON THE SURVIVABILITY OF ROUTING PROTOCOLS IN AD HOC WIRELESS NETWORKS
Survivable routing protocols are able to provide service in the presence of attacks and failures. The strongest attacks that protocols can experience are attacks where adversaries have full control of a number of authenticated nodes that behave arbitrarily to disrupt the network, also referred to as Byzantine attacks. This work examines the survivability of ad hoc wireless routing protocols in ...
متن کاملاستفاده از خوشه بندی در پروتکل مسیریابی AODV برای شبکه های بین خودرویی بر روی سناریوی بزرگراه
Vehicular Ad hoc networks are a subset of mobile Ad hoc networks in which vehicles are considered as network nodes. Their major difference is rapid mobility of nodes which causes the quick change of topology in this network. Quick changes in the topology of the network are considered as a big challenge For routing in these networks, routing protocols must be robust and reliable. AODV Routing pr...
متن کاملComparing AODV and ADV Routing Protocols in Urban Environment
In vehicular ad hoc networks there is the ability to communicate between vehicles. This Communication which is wireless should be rapid and reliable. These networks have unique characteristic. This communication among vehicles has many advantages in safety and comfort applications. Since, the roads are always encountered to accidents and risks, using optimized tools could be useful in these sit...
متن کاملEvaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)
Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency on a fixed infrastructure. There have been many studies done in this area to improve the quality and efficiency of the routing protocols in MANETs. However unique characteristics of MANETs topology such as open peer-to-...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007