DocumentCode :
1503302
Title :
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference
Author :
Young, Maxwell ; Boutaba, Raouf
Author_Institution :
David R. Cheriton Sch. of Comput. Sci., Univ. of Waterloo, Waterloo, ON, Canada
Volume :
13
Issue :
4
fYear :
2011
Firstpage :
617
Lastpage :
641
Abstract :
Interference is an unavoidable property of the wireless communication medium and, in sensor networks, such interference is exacerbated due to the energy-starved nature of the network devices themselves. In the presence of antagonistic interference, reliable communication in sensor networks becomes an extremely challenging problem that, in recent years, has attracted significant attention from the research community. This survey presents the current state of affairs in the formulation of theoretical models for adversarial interference in sensor networks and the different algorithmic remedies developed by the research community. There is a particular focus on jamming adversaries and Byzantine faults as these capture a wide range of benign faults as well as malicious attacks. The models in the literature are examined and contrasted with the aim of discerning the underlying assumptions that dictate analytical bounds with regards to feasibility and a number of performance metrics such as communication complexity, latency, and energy efficiency. Limitations are also highlighted with a focus on how various results impact real world applications and, conversely, how the current sensor network technology informs newer models. Finally, directions for future research are discussed.
Keywords :
jamming; telecommunication security; wireless sensor networks; Byzantine faults; adversarial interference; antagonistic interference; communication complexity; dictate analytical bounds; energy efficiency; energy-starved nature; jamming adversaries; malicious attacks; malicious interference; network devices; performance metrics; theoretical models; wireless communication medium; wireless sensor networks; Authentication; Broadcasting; Complexity theory; Cryptography; Fault tolerance; Interference; Wireless sensor networks; Byzantine fault; Sensor networks; adversary; algorithm/protocol design and analysis; fault tolerance; jamming; reliable broadcast; security;
fLanguage :
English
Journal_Title :
Communications Surveys & Tutorials, IEEE
Publisher :
ieee
ISSN :
1553-877X
Type :
jour
DOI :
10.1109/SURV.2011.041311.00156
Filename :
5755214
Link To Document :
بازگشت