An algebraic watchdog for wireless network coding Citation

نویسندگان

  • MinJi Kim
  • Muriel Médard
  • João Barros
  • Ralf Kötter
چکیده

In this paper, we propose a scheme, called the algebraic watchdog for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global self-checking network. Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an active role in checking the node downstream. This work is inspired by Marti et al.’s watchdogpathrater, which attempts to detect and mitigate the effects of routing misbehavior. As the first building block of a such system, we focus on a two-hop network. We present a graphical model to understand the inference process nodes execute to police their downstream neighbors; as well as to compute, analyze, and approximate the probabilities of misdetection and false detection. In addition, we present an algebraic analysis of the performance using an hypothesis testing framework, that provides exact formulae for probabilities of false detection and misdetection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on the wi-fi wireless network systems penetration approaches

Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...

متن کامل

An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

 Abstract — Mobile ad hoc network (MANET) is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central...

متن کامل

Network coding for robust wireless networks

Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth and strict delay requirements of future applications. Wireless networks suffer from frequent losses and low throughput. We aim to provide designs for robust wireless networks....

متن کامل

The performance of a watchdog protocol for wireless network security

In wireless networks, a watchdog mechanism can be a part of the security architecture used to identify nodes that fail to forward the packets they agree to forward. In this paper, we propose two protocols to address the ambiguous collision limitation of watchdogs. The Watchdog Alert (WA) and Watchdog Confirmation (WC) protocols are variants of the Carrier Sense Multiple Access with Collision Av...

متن کامل

Intrusion Detection in Wireless Sensor Networks Using Watchdog Based Clonal Selection Algorithm

Wireless Sensor Networks (WSN) are emerging as a new tier within the IT scheme and a rich domain of active analysis involving hardware and system design, networking, and programming models, data management, security and social actors. Wireless sensor networks are compared with wired networks are additional well vulnerable to attacks and intrusions. The intrusion detection is outlined as a mecha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009