Issue No. 01 - January (2007 vol. 6)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TMC.2007.8
Claudio Basile , IEEE
Zbigniew Kalbarczyk , IEEE
Ravishankar K. Iyer , IEEE
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where local node interaction is used to neutralize errors/attacks at the source, both preventing errors/attacks from propagating in the network and improving the fidelity of the propagated information. We achieve this goal by combining statistical (a proposed fault-tolerant cluster algorithm) and security (threshold cryptography) techniques with application-aware checks to exploit the data/computation that is partially and naturally replicated in wireless applications. We have prototyped an inner-circle framework and used it to demonstrate the idea of inner-circle consistency in two significant wireless scenarios: 1) the neutralization of black hole attacks in AODV networks and 2) the neutralization of sensor errors in a target detection/localization application executed over a wireless sensor network.
Intrusion tolerance, ad hoc networks, sensor networks, security, reliability.
Z. Kalbarczyk, R. K. Iyer and C. Basile, "Inner-Circle Consistency for Wireless Ad Hoc Networks," in IEEE Transactions on Mobile Computing, vol. 6, no. , pp. 39-55, 2007.