A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks

Jonathan Ponniah, Yih Chun Hu, P. R. Kumar

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We build upon the clean-slate, holistic approach to the design of secure protocols for wireless ad-hoc networks proposed in part one. We consider the case when the nodes are not synchronized, but instead have local clocks that are relatively affine. In addition, the network is open in that nodes can enter at arbitrary times. To account for this new behavior, we make substantial revisions to the protocol in part one. We define a game between protocols for open, unsynchronized nodes and the strategies of adversarial nodes. We show that the same guarantees in part one also apply in this game: the protocol not only achieves the max-min utility, but the min-max utility as well. That is, there is a saddle point in the game, and furthermore, the adversarial nodes are effectively limited to either jamming or conforming with the protocol.

Original languageEnglish (US)
Title of host publication2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages183-190
Number of pages8
ISBN (Electronic)9783901882746
DOIs
StatePublished - Jul 6 2015
Event2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015 - Mumbai, India
Duration: May 25 2015May 29 2015

Publication series

Name2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015

Other

Other2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015
Country/TerritoryIndia
CityMumbai
Period5/25/155/29/15

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Optimization
  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks'. Together they form a unique fingerprint.

Cite this