Dynamics of learning algorithms for the On-Demand Secure Byzantine Routing protocol

Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models. These enhancements include a) modifications to the packet flow rates, b) a network layer retransmission capability and c) Nodal Weighting (in addition to Link Weighting) in the reputation database. These enhancements are meant to improve the learning rate of the protocol. The attack models investigated include previously investigated models [4] and a new and effective attack model, termed the MAC-Level Attack. We investigate the protocol enhancements through analytic models and simulation studies. We find that the protocol enhancements improve the learning times of the ODSBR protocol. The Nodal Weighting enhancement specifically helps in the presence of the various colluding Byzantine Attack models investigated.

Original languageEnglish (US)
Title of host publicationSecurity and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Revised Selected Papers
Pages98-112
Number of pages15
DOIs
StatePublished - 2006
Externally publishedYes
Event3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006 - Hamburg, Germany
Duration: Sep 20 2006Sep 21 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4357 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, ESAS 2006
Country/TerritoryGermany
CityHamburg
Period9/20/069/21/06

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Keywords

  • Byzantine attacks
  • MANET routing
  • Security

Fingerprint

Dive into the research topics of 'Dynamics of learning algorithms for the On-Demand Secure Byzantine Routing protocol'. Together they form a unique fingerprint.

Cite this