DSpace Repository

Monitoring-Based Method for Securing Link State Routing against Byzantine Attacks in Wireless Networks

Show simple item record

dc.contributor.author Ojetunde, Babatunde en
dc.contributor.author Shibata, Naoki en
dc.contributor.author Gao, Juntao en
dc.date.accessioned 2018-04-02T05:37:48Z en
dc.date.available 2018-04-02T05:37:48Z en
dc.date.issued 2018-02-15 en
dc.identifier.issn 1882-6652 en
dc.identifier.uri http://hdl.handle.net/10061/12307 en
dc.description.abstract Secure communications is essential in many areas such as disaster management and battlefield communications. To detect and prevent attacks in such applications, most existing protocols adopt a cryptography-based approach, trust-based approach (reputation of nodes), or incentive-based approach. However, such protocols still have drawbacks, such as expensive overhead, difficulty in maintaining secure key and session management, or leaving routes unsecured against Byzantine attacks. In this paper, we introduce a monitoring-based method in the link state routing protocol to secure the packets' route against Byzantine attacks. The goal of our proposed scheme is to guarantee communication among connected benign nodes in the network. Specifically, each node monitors the action of neighboring nodes and compares the optimal packet route against the packet route history. Nodes in the network create a packet history field which is used to record all activities of an intermediate node when receiving and forwarding packets. Our scheme provides mutual monitoring in which nodes in the network can validate the packet history field of other nodes and report malicious activities. Also, our scheme uses a statistical method to know if a node is dropping packets intentionally by analyzing the packet dropping behavior of each node. The proposed scheme provides protection against colluding attacks and other Byzantine attacks. The proposed monitoring-based method achieves an average of 89% to 96% packet delivery ratio when 11% to 21% active malicious links are excluded from the network. en
dc.language.iso en en
dc.publisher Information Processing Society of Japan en
dc.rights © 2018 by the Information Processing Society of Japan ja
dc.rights Notice for the use of this material: The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan. Comments are welcome. Mail to address editj@ipsj.or.jp, please. ja
dc.subject secure routing en
dc.subject routing protocol en
dc.subject routing attack en
dc.subject monitoring en
dc.subject Byzantine attacks en
dc.subject link state routing en
dc.title Monitoring-Based Method for Securing Link State Routing against Byzantine Attacks in Wireless Networks en
dc.type.nii Journal Article en
dc.contributor.transcription シバタ, ナオキ ja
dc.contributor.alternative 柴田, 直樹 ja
dc.textversion publisher en
dc.identifier.abstracturl https://www.jstage.jst.go.jp/article/ipsjjip/26/0/26_98/_article/-char/ja/ en
dc.identifier.ncid AA00700121 en
dc.identifier.jtitle Journal of Information Processing en
dc.identifier.volume 26 en
dc.identifier.spage 98 en
dc.identifier.epage 110 en
dc.relation.doi 10.2197/ipsjjip.26.98 en
dc.identifier.NAIST-ID 83518332 en
dc.identifier.NAIST-ID 22740047 en
dc.identifier.NAIST-ID 74650839 en

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace

Advanced Search


My Account