• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Providing fault-tolerant ad hoc routing service in adversarial environments,” (2004)

by Y Xue, K Nahrstedt
Venue:Wireless Pers.Commun.,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 23
Next 10 →

Maintaining network connectivity and performance in robot teams

by M. Ani Hsieh, Anthony Cowley, Camillo J. Taylor, M. Ani Hsieh, Anthony Cowley, Vijay Kumar, Camillo J. Taylor - J. Field Robotics , 2008
"... This paper is posted at ScholarlyCommons. ..."
Abstract - Cited by 26 (2 self) - Add to MetaCart
This paper is posted at ScholarlyCommons.
(Show Context)

Citation Context

...tion and cooperation within multi-robot teams. Much of the research in the mobile wireless network community has been devoted to the development of novel algorithms to handle packet routing, such as [=-=Xue and Nahrstedt, 2004-=-] and [Aguero et al., 2003], resource allocation [Feistel and Stanczak, 2005], and bandwidth management [Nahrstedt et al., 2004] for mobile nodes. However, control of mobile robot teams provides us wi...

REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits

by William Kozma, Loukas Lazos - In WiSec , 2009
"... Wireless ad hoc networks rely on multi-hop routes to trans-port data from source to destination. The routing function is implemented in a collaborative manner, with each node re-sponsible for relaying traffic to the destination. However, an increasingly sophisticated pool of users with easy access t ..."
Abstract - Cited by 15 (3 self) - Add to MetaCart
Wireless ad hoc networks rely on multi-hop routes to trans-port data from source to destination. The routing function is implemented in a collaborative manner, with each node re-sponsible for relaying traffic to the destination. However, an increasingly sophisticated pool of users with easy access to commercial wireless devices, combined with the poor phys-ical and software security of the devices, can lead to node misconfiguration or misbehavior. A misbehaving node may refuse to forward packets in order to conserve its energy (selfishness), or simply degrade network performance (mali-ciousness). In this paper, we investigate the problem of uniquely iden-tifying the set of misbehaving nodes who refuse to forward packets. We propose a novel misbehavior identification sche-me called REAct that provides resource-efficient account-ability for node misbehavior. REAct identifies misbehaving nodes based on a series of random audits triggered upon a performance drop. We show that a source-destination pair using REAct can identify any number of independently misbehaving nodes based on behavioral proofs provided by nodes. Proofs are constructed using Bloom filters which are storage-efficient membership structures, thus significantly reducing the communication overhead for misbehavior de-tection.
(Show Context)

Citation Context

...tly proposed solutions to the routing misbehavior problem can be classified into incentive-based schemes [7, 12, 23], reputation-based schemes, [5, 6, 11, 17, 19, 21] and acknowledgment-based schemes =-=[1,2,15,20,22]-=-. Reputationbased systems rely on message overhearing for the evaluation of the reputation of each node. However, operating in promiscuous mode can be almost as expensive as transmitting [9]. Furtherm...

Mitigating Routing Misbehavior in Disruption Tolerant Networks

by Qinghua Li, Student Member, Guohong Cao
"... Abstract—In disruption tolerant networks (DTNs), selfish or malicious nodes may drop received packets. Such routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Although techniques have been proposed to mitigate routing misbehavior in mobile ..."
Abstract - Cited by 12 (5 self) - Add to MetaCart
Abstract—In disruption tolerant networks (DTNs), selfish or malicious nodes may drop received packets. Such routing misbehavior reduces the packet delivery ratio and wastes system resources such as power and bandwidth. Although techniques have been proposed to mitigate routing misbehavior in mobile ad hoc networks, they cannot be directly applied to DTNs because of the intermittent connectivity between nodes. To address the problem, we propose a distributed scheme to detect packet dropping in DTNs. In our scheme, a node is required to keep a few signed contact records of its previous contacts, based on which the next contacted node can detect if the node has dropped any packet. Since misbehaving nodes may misreport their contact records to avoid being detected, a small part of each contact record is disseminated to a certain number of witness nodes, which can collect appropriate contact records and detect the misbehaving nodes. We also propose a scheme to mitigate routing misbehavior by limiting the number of packets forwarded to the misbehaving nodes. Trace-driven simulations show that our solutions are efficient and can effectively mitigate routing misbehavior. Index Terms—Detection, disruption tolerant networks, mitigation, routing misbehavior, security. I.
(Show Context)

Citation Context

..., a node may move away right after forwarding the packet to its neighbor, and thus cannot overhear if the neighbor forwards the packet. Another line of work uses the acknowledgement (ACK) packet [11]–=-=[13]-=- sent from the downstream node along the routingpathtoconfirm if the packet has been forwarded by the next hop. Liu et al. [11] proposed a 2ACK scheme in which the sending node waits for an ACK from t...

Outlier detection in ad hoc networks using dempster-shafer theory

by Wenjia Li, Anupam Joshi - in Proceedings of the Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 2009. MDM ’09 , 2009
"... Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have been proposed to identify misbehaving nodes. Most of these security schemes rely on either a predefined threshold, or a set ..."
Abstract - Cited by 8 (2 self) - Add to MetaCart
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have been proposed to identify misbehaving nodes. Most of these security schemes rely on either a predefined threshold, or a set of well-defined training data to build up the detection mechanism before effectively identifying the malicious peers. However, it is generally difficult to set appropriate thresholds, and collecting training datasets representative of an attack ahead of time is also problematic. We observe that the malicious peers generally demonstrate behavioral patterns different from all the other normal peers, and argue that outlier detection techniques can be used to detect malicious peers in ad hoc networks. A problem with this approach is combining evidence from potentially untrustworthy peers to detect the outliers. In this paper, an outlier detection algorithm is proposed that applies the Dempster-Shafer theory to combine observation results from multiple nodes because it can appropriately reflect uncertainty as well as unreliability of the observations. The simulation results show that the proposed scheme is highly resilient to attackers and it can converge stably to a common outlier view amongst distributed nodes with a limited communication overhead.
(Show Context)

Citation Context

...tchdog and pathrater, to detectsand isolate misbehaving nodes, which are nodes thatsdo not forward packets. There are also some othersproposed solutions that aim to cope with the routingsmisbehaviors =-=[29, 30, 31]-=-.sThere is little work in which the Dempster-ShafersTheory has been applied to MANETs. The two mostsrelevant research efforts are discussed in [40] and [41].sIn [40], DST is utilized to combine the di...

Security through collaboration in manets

by Wenjia Li, James Parker, Anupam Joshi - in Proceedings of 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2008 , 2008
"... Abstract. It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that ar ..."
Abstract - Cited by 5 (3 self) - Add to MetaCart
Abstract. It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security schemes have been proposed that depend on cooperation amongst the nodes in a MANET for identifying nodes that are exhibiting malicious behavior such as packet dropping, packet modification, and packet misrouting. We argue that in general, this problem can be viewed as an instance of detecting nodes whose behavior is an outlier when compared to others. In this paper, we propose a collaborative outlier detection algorithm for MANETs that factors in a nodes reputation. The algorithm leads to a common outlier view amongst distributed nodes with a limited communication overhead. Simulation results demonstrate that the proposed algorithm is efficient and accurate.
(Show Context)

Citation Context

...hold. The “pathrater" module then utilizes this knowledge ofsmisbehaving nodes to avoid them in path selection. There are also some othersproposed solutions that aim to handle the routing misbehavior =-=[29, 30, 31]-=-.s3 Gossip-based Outlier Detection AlgorithmsIn this section, we describe our gossip-based distributed outlier detection algorithm.sThe goal of the algorithm is to find the top k outliers in terms of ...

A lightweight intrusiontolerant overlay network

by Rafael R. Obelheiro, Joni Da Silva Fraga - In Proc. IEEE ISORC , 2006
"... The Internet routing layer is at times too slow at recov-ering from faults and makes a sub-optimal use of redun-dancy available at the IP layer. Overlay networks can over-come these deciencies to provide communication infras-tructures with greater availability and exibility. The ma-jority of current ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
The Internet routing layer is at times too slow at recov-ering from faults and makes a sub-optimal use of redun-dancy available at the IP layer. Overlay networks can over-come these deciencies to provide communication infras-tructures with greater availability and exibility. The ma-jority of current experiences, however, are able to tolerate only simple (crash) failures of the underlying network. In this paper we present LITON, an overlay network architec-ture that aims at providing highly available communication in spite of faults and intrusions in the network. We also present a graph-theoretic model that allows the degree of fault and intrusion tolerance of a given overlay to be deter-mined, as well as simulation results that validate this model and demonstrate that LITON accomplishes its goal even in worst-case scenarios. 1.
(Show Context)

Citation Context

... or routing packets. Therefore, LITON relies on the observation of the end-toend behavior of routes in use in order to detect failures and recover from them. This is not a new idea; Xue and Nahrstedt =-=[19]-=- have used it previously in a MANET environment. The analysis of the end-to-end behavior of a route depends on loss and round-trip time (RTT) measurements, which in turn require acknowledgments (ACKs)...

Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols

by Darlan Vivian, Eduardo Adilio, Pelinson Alchieri, Carlos Becker Westphall
"... An Ad Hoc network is formed by mobile computers (nodes) with wireless interfaces that communicate amongst themselves without the help of any infrastructure. Due to their characteristics, the Ad Hoc networks are prone to the presence of malicious nodes that can degrade your performance. This fact mot ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
An Ad Hoc network is formed by mobile computers (nodes) with wireless interfaces that communicate amongst themselves without the help of any infrastructure. Due to their characteristics, the Ad Hoc networks are prone to the presence of malicious nodes that can degrade your performance. This fact motivated the appearance of security protocols that implement mechanisms to avoid attacks like DoS. In this article is accomplished a verification the impact caused in the performance of the Ad Hoc networks with the use of security protocols (SEAD and Ariadne) in relation to the use of protocols that don't have security mechanisms (DSDV and DSR). Firstly an Ad Hoc network is simulated using these routing protocols and soon afterwards a comparative study is accomplished through graphs of the values obtained for each basic QoS

A REVIEW PAPER ON AD HOC NETWORK SECURITY

by Karan Singh, R. S. Yadav, Karan Singh, Rama Shankar Yadav
"... In this article we present a survey of secure ad hoc routing protocols for wireless networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliabili ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In this article we present a survey of secure ad hoc routing protocols for wireless networks. Ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Attacks on ad hoc network routing protocols disrupt network performance and reliability with there solution. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. The comparison between the proposed solutions and parameters of ad hoc network shows the performance according to secure protocols. We discuss in this paper routing protocol and challenges and also discuss authentication in ad hoc network.
(Show Context)

Citation Context

.... Table-driven ad hoc routing protocols maintain at all times routing information regarding the connectivity of every node to all other nodes that participate in the network. Also known as proactive, =-=[49]-=- these protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [27]. An alternative approach to that followed by table-driven protocols i...

Policy-based Malicious Peer Detection in Ad Hoc Networks

by Wenjia Li, Anupam Joshi, Senior Member, Tim Finin
"... various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been made to address the problem of misbehavior detection. However, little research work has been done to ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
various node misbehaviors due to their unique features, such as highly dynamic network topology, rigorous power constraints and error-prone transmission media. Significant research efforts have been made to address the problem of misbehavior detection. However, little research work has been done to distinguish truly malicious behaviors from the faulty behaviors. Both the malicious behaviors and the faulty behaviors are generally equally treated as misbehaviors without any further investigation by most of the traditional misbehavior detection mechanisms. In this paper, we propose and develop a policy-based malicious peer detection mechanism, in which context information, such as communication channel status, buffer status, and transmission power level, is collected and then used to determine whether the misbehavior is likely a result of malicious activity or not. Simulation results illustrate that the policy-based malicious peer detection mechanism is able to distinguish malicious peers from faulty peers with high confidence. Moreover, the mechanism converges to a consistent view of malicious nodes amongst all the nodes with a limited communication overhead. A I.
(Show Context)

Citation Context

...ly watchdog and pathrater, to detect and isolate misbehaving nodes, which are nodes that do not forward packets. There are also other proposed solutions that aim to cope with the routing misbehaviors =-=[16, 17, 18]-=-. In previous work [12, 19], we have described a gossip-based misbehavior detection algorithm in which the outlier detection method is adopted to identify various node misbehaviors. Weighted voting an...

MOTION CONTROL STRATEGIES FOR NETWORKED ROBOT TEAMS IN ENVIRONMENTS WITH OBSTACLES

by M. Ani Hsieh, Pedro Ponte Castañeda, M. Ani Hsieh, M. Ani Hsieh , 2007
"... To my mother. iii Acknowledgements First and foremost, I would like to express my most sincere gratitude and admiration to my advisor Vijay Kumar. Without his encouragement, support, and guidance, I would never have made the decision to come to GRASP and would have never completed this work. My deep ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
To my mother. iii Acknowledgements First and foremost, I would like to express my most sincere gratitude and admiration to my advisor Vijay Kumar. Without his encouragement, support, and guidance, I would never have made the decision to come to GRASP and would have never completed this work. My deepest thanks to the remainder of my dissertation committee, Professors C.J. Taylor, Ali Jadbabaie, and Claire Tomlin for their comments and suggestions. I especially want to express my gratitude to C.J. Taylor and George Pappas for supporting me in my various endeavors throughout my time at GRASP. Special thanks to Luiz Chaimowicz, Adam Halasz, and Savvas Loizou for the numerous discussions, including topics that go beyond the scope of this work. Thanks to Jonathan Fink and Nathan Michael for all their help with the indoor experiments. Also, I would like to acknowledge everyone involved in the MARS2020 program and the Penn Athletics Department for making Chapter 3 possible. Additionally, I would like to thank all GRASPees whom I have had the privelege to know and work with the last five years, especially Nora Ayanian, Dave Cappelleri, Jim Killer, Babak Shirmohammadi, and Peng Song. My most sincere gratitute and appreciation to my family, especially my brother and mother, for whom all my accomplishments belong to. Last, but always first in my heart, my deepest thanks to Anthony, for not only iv being my most ardent supporter, but also my most honest critic. I can’t wait to see where this journey takes us next.
(Show Context)

Citation Context

...s that can perceive their environment and respond to it. Much of the research in the mobile wireless network community has been devoted to the development of novel algorithms to handle packet routing =-=[1, 99]-=-, resource allocation [31], and bandwidth management [61] for mobile nodes. However, control of mobile robot teams provides us with the capability to shape the team’s communication needs based on cont...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University