TY - GEN
T1 - Local and robust group management in DTNs
AU - Nelson, Samuel C.
AU - Kravets, Robin
PY - 2010
Y1 - 2010
N2 - Effectively utilizing groups in delay tolerant networks (DTNs) can both improve the throughput of unicast routing protocols and open the door for a wide range of paradigms, such as anycast and multicast. Unfortunately, in DTN environments, there is no centralized entity that can quickly and reliably transmit group membership lists, and hence group information must be disseminated through unreliable and potentially malicious nodes. In this paper, we propose a local and robust group information dissemination and consolidation protocol, called MembersOnly, that both quickly and accurately transmits group membership information to all nodes in the network, even if multiple malicious nodes attempt to disrupt the process. We show via analysis and simulations that MembersOnly is able to withstand multiple types of attacks, with only very limited periods of vulnerability that disappear relatively quickly. This is in contrast to current techniques that cannot withstand many of these attacks, resulting in quick and thorough corruption of group membership lists. In addition, we show via simulation that even the most basic routing protocols can gain a performance advantage when using MembersOnly.
AB - Effectively utilizing groups in delay tolerant networks (DTNs) can both improve the throughput of unicast routing protocols and open the door for a wide range of paradigms, such as anycast and multicast. Unfortunately, in DTN environments, there is no centralized entity that can quickly and reliably transmit group membership lists, and hence group information must be disseminated through unreliable and potentially malicious nodes. In this paper, we propose a local and robust group information dissemination and consolidation protocol, called MembersOnly, that both quickly and accurately transmits group membership information to all nodes in the network, even if multiple malicious nodes attempt to disrupt the process. We show via analysis and simulations that MembersOnly is able to withstand multiple types of attacks, with only very limited periods of vulnerability that disappear relatively quickly. This is in contrast to current techniques that cannot withstand many of these attacks, resulting in quick and thorough corruption of group membership lists. In addition, we show via simulation that even the most basic routing protocols can gain a performance advantage when using MembersOnly.
KW - DTN
KW - Group management
UR - http://www.scopus.com/inward/record.url?scp=78649288538&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78649288538&partnerID=8YFLogxK
U2 - 10.1145/1859934.1859937
DO - 10.1145/1859934.1859937
M3 - Conference contribution
AN - SCOPUS:78649288538
SN - 9781450301398
T3 - Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
SP - 5
EP - 12
BT - Proceedings of the 5th ACM Workshop on Challenged Networks, CHANTS '10, Co-located with MobiCom'10 and 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'10
PB - Association for Computing Machinery
T2 - 5th ACM Workshop on Challenged Networks, CHANTS '10
Y2 - 20 September 2010 through 24 September 2010
ER -