The Community for Technology Leaders
RSS Icon
Issue No.01 - January (2007 vol.6)
pp: 39-55
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where local node interaction is used to neutralize errors/attacks at the source, both preventing errors/attacks from propagating in the network and improving the fidelity of the propagated information. We achieve this goal by combining statistical (a proposed fault-tolerant cluster algorithm) and security (threshold cryptography) techniques with application-aware checks to exploit the data/computation that is partially and naturally replicated in wireless applications. We have prototyped an inner-circle framework and used it to demonstrate the idea of inner-circle consistency in two significant wireless scenarios: 1) the neutralization of black hole attacks in AODV networks and 2) the neutralization of sensor errors in a target detection/localization application executed over a wireless sensor network.
Intrusion tolerance, ad hoc networks, sensor networks, security, reliability.
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer, "Inner-Circle Consistency for Wireless Ad Hoc Networks", IEEE Transactions on Mobile Computing, vol.6, no. 1, pp. 39-55, January 2007, doi:10.1109/TMC.2007.8
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool