首页> 外文期刊>International Journal of Network Security & Its Applications >Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network [
【24h】

Byzantine Behaviour (B2) - Mitigating Midway Multicast Misbehaviour (M4) In Adhoc Network [

机译:拜占庭行为(B2)-缓解Adhoc网络中的中途组播行为不当(M4)[

获取原文
           

摘要

Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise and subversion of the authenticated, trusted and participating node in the network leads to Byzantine attack or behavior. Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auction network inherently embracing multicast technology has been taken as the case study. The implications of the Byzantine attack in the online auction Network have been studied. Besides the existing network performance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameter by name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault free multicast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhoc network thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilient defense solutions to subvert this attack in auction Network becomes the focus of this paper
机译:Ad-hoc网络是移动计算的新兴领域,也是多播通信的有效范例。在多播通信的情况下,由于网络固有的独特特性而使网络面临的安全挑战更加严重。 ad hoc网络中的组通信容易受到大量外部人员和内部人员的攻击。针对外部攻击者提出的安全解决方案由于行为不同,因此无法直接应用于内部攻击者。网络中经过身份验证,受信任和参与的节点的妥协和颠覆会导致拜占庭式攻击或行为。攻击者完全控制许多经过身份验证的设备并任意采取行动破坏多播路由的攻击称为拜占庭式攻击。以固有地采用组播技术的在线拍卖网络为例。已经研究了在线拍卖网络中拜占庭式攻击的含义。除了现有的网络性能参数(如延迟,抖动,吞吐量,数据包传输率(PDR))外,还包括名称即时邻域担保凭单计数(INAVC)的参数,以主动选择无故障的多播路由。该主动参数是动态的,反映了即席网络中真正的多播体系结构,从而可以立即修剪拜占庭对手。提供强大而灵活的防御解决方案来颠覆拍卖网络中的这种攻击成为本文的重点

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号