TY - JOUR
T1 - BSMR
T2 - Byzantine-resilient secure multicast routing in multihop wireless networks
AU - Curtmola, Reza
AU - Nita-Rotaru, Cristina
N1 - Funding Information:
The first author would like to thank Razvan Musaloiu-E. for the fruitful “copy-room” discussions in the early stages of this work. This work was supported by the National Science Foundation under CyberTrust Award 0545949. The views expressed in this research are not endorsed by the US National Science Foundation. A preliminary version of this paper appeared in [1].
PY - 2009/4
Y1 - 2009/4
N2 - Multihop wireless networks rely on node cooperation to provide multicast services. The multihop communication offers increased coverage for such services but also makes them more vulnerable to insider (or Byzantine) attacks coming from compromised nodes that behave arbitrarily to disrupt the network. In this work, we identify vulnerabilities of on-demand multicast routing protocols for multihop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. We propose BSMR, a novel secure multicast routing protocol designed to withstand insider attacks from colluding adversaries. Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results that demonstrate that BSMR effectively mitigates the identified attacks.
AB - Multihop wireless networks rely on node cooperation to provide multicast services. The multihop communication offers increased coverage for such services but also makes them more vulnerable to insider (or Byzantine) attacks coming from compromised nodes that behave arbitrarily to disrupt the network. In this work, we identify vulnerabilities of on-demand multicast routing protocols for multihop wireless networks and discuss the challenges encountered in designing mechanisms to defend against them. We propose BSMR, a novel secure multicast routing protocol designed to withstand insider attacks from colluding adversaries. Our protocol is a software-based solution and does not require additional or specialized hardware. We present simulation results that demonstrate that BSMR effectively mitigates the identified attacks.
KW - Byzantine attacks
KW - Byzantine resiliency
KW - Multihop wireless networks
KW - Secure multicast routing
UR - http://www.scopus.com/inward/record.url?scp=60949084324&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=60949084324&partnerID=8YFLogxK
U2 - 10.1109/TMC.2008.134
DO - 10.1109/TMC.2008.134
M3 - Article
AN - SCOPUS:60949084324
SN - 1536-1233
VL - 8
SP - 445
EP - 459
JO - IEEE Transactions on Mobile Computing
JF - IEEE Transactions on Mobile Computing
IS - 4
M1 - 4624271
ER -