Abstract
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where local node interaction is used to neutralize errors/attacks at the source, both preventing errors/attacks from propagating in the network and improving the fidelity of the propagated information. We achieve this goal by combining statistical (a proposed fault-tolerant cluster algorithm) and security (threshold cryptography) techniques with application-aware checks to exploit the data/computation that is partially and naturally replicated in wireless applications. We have prototyped an inner-circle framework with the ns-2 network simulator, and we use it to demonstrate the idea of inner-circle consistency in two significant wireless scenarios: (1) the neutralization of black hole attacks in AODV networks and (2) the neutralization of sensor errors in a target detection/localization application executed over a wireless sensor network.
Original language | English (US) |
---|---|
Pages | 518-527 |
Number of pages | 10 |
DOIs | |
State | Published - 2005 |
Event | 2005 International Conference on Dependable Systems and Networks - Yokohama, Japan Duration: Jun 28 2005 → Jul 1 2005 |
Other
Other | 2005 International Conference on Dependable Systems and Networks |
---|---|
Country/Territory | Japan |
City | Yokohama |
Period | 6/28/05 → 7/1/05 |
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Computer Networks and Communications