A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks

Jonathan Ponniah, Yih Chun Hu, P. R. Kumar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We propose a clean-slate, holistic approach to the design of secure protocols for wireless ad-hoc networks. We design a protocol that enables a collection of distributed nodes to emerge from a primordial birth and form a functioning network. We consider the case when nodes are synchronized and the network is closed, in that no other nodes can join. We define a game between protocols and adversarial nodes, and describe a protocol that is guaranteed to achieve the max-min payoff regardless of what the adversarial nodes do. Moreover, even though the adversarial nodes always know the protocol a priori, we show an even stronger result; the protocol is guaranteed to achieve the min-max payoff. Hence there is a saddle point in the game between protocols and adversarial strategies. Finally, we show that the adversarial nodes are in effect, strategically confined to either jamming or conforming to the protocol. These guarantees are contingent on a set of underlying model assumptions, and cease to be valid if the assumptions are violated.

Original languageEnglish (US)
Title of host publication2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages175-182
Number of pages8
ISBN (Electronic)9783901882746
DOIs
StatePublished - Jul 6 2015
Event2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015 - Mumbai, India
Duration: May 25 2015May 29 2015

Publication series

Name2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015

Other

Other2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015
CountryIndia
CityMumbai
Period5/25/155/29/15

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Optimization
  • Modeling and Simulation

Fingerprint Dive into the research topics of 'A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks'. Together they form a unique fingerprint.

  • Cite this

    Ponniah, J., Hu, Y. C., & Kumar, P. R. (2015). A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks. In 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015 (pp. 175-182). [7151070] (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/WIOPT.2015.7151070