DocumentCode :
2170078
Title :
Securing weakly-dominating virtual backbones in mobile ad hoc networks
Author :
Di Crescenzo, Giovanni ; Fecko, M. ; Ge, Ruiyang
Author_Institution :
Telcordia Technol., Piscataway, NJ
fYear :
0
fDate :
0-0 0
Lastpage :
580
Abstract :
Virtual backbone structures are of fundamental importance in mobile ad hoc networks (MANET) as they are essential to support various applications such as service discovery and provision, multicast, routing, etc. In this paper we consider a very natural approach for the creation of virtual backbones, based on weakly-dominating sets, and investigate its security properties against Byzantine adversaries that can corrupt up to a given threshold of nodes. We formalize the notion of secure protocols for the creation and management of virtual backbones, and design a distributed protocol generating weakly-dominating virtual backbones, that is both efficient, according to standard MANET metrics, and secure against Byzantine adversaries corrupting up to a given threshold of nodes
Keywords :
ad hoc networks; mobile radio; protocols; telecommunication network management; telecommunication security; Byzantine adversary; MANET; distributed protocol; mobile ad hoc network; network management; secure protocol; virtual backbone structure; Collaboration; Computer networks; Cryptographic protocols; Drives; Government; Intelligent networks; Mobile ad hoc networks; Routing; Security; Spine;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks, 2006. WoWMoM 2006. International Symposium on a
Conference_Location :
Buffalo-Niagara Falls, NY
Print_ISBN :
0-7695-2593-8
Type :
conf
DOI :
10.1109/WOWMOM.2006.98
Filename :
1648517
Link To Document :
بازگشت