An OnDemand Secure Routing Protocol Resilient to Byzantine Failures
#1

[attachment=5332]

OnDemand
Secure Routing Protocol Resilient to
Byzantine Failures


Baruch Awerbuch, David Holmer, Cristina NitaRotaru
and Herbert Rubens
Department of Computer Science
Johns Hopkins University
3400 North Charles St.
Baltimore, MD 21218 USA


ABSTRACT

An ad hoc wireless network is an autonomous self-organizing system of mobile nodes connected by wireless links where nodes not in direct range can communicate via intermediate nodes. A common technique used in routing protocols for ad hoc wireless networks is to establish the routing paths ondemand, as opposed to continually maintaining a complete routing table. A signi
cant concern in routing is the ability to function in the presence of byzantine failures which include nodes that drop, modify, or mis-route packets in an attempt to disrupt the routing service. We propose an on-demand routing protocol for ad hoc wireless networks that provides resilience to byzantine failures caused by individual or colluding nodes. Our adaptive probing technique detects a malicious page link after log n faults have occurred, where n is the length of the path. These links are then avoided by multiplicatively increasing their weights and by using an on-demand route discovery protocol that
nds a least weight path to the destination.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: failures cause in highway pavement ppt, failures of foundation ppt, 3 d secure protocol, seminar on highway failures, embedded system failures, bsmr byzantine resilient secure multicast routing in multihop wireless networks, types of failures in distributed database,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,331 03-04-2014, 11:39 PM
Last Post: seminar report asees
  SEMINAR REPORT on Adaptive Routing in Adhoc Networks Computer Science Clay 2 4,950 02-01-2013, 10:25 AM
Last Post: seminar details
  AN EXTENDED ZONE ROUTING PROTOCOL FOR SERVICE DISCOVERY IN MOBILE AD HOC NETWORKS seminar presentation 1 9,337 24-12-2012, 12:47 PM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 7,968 22-12-2012, 10:54 AM
Last Post: seminar details
  Enhanced QoS Multicast Routing Protocol nit_cal 1 5,730 20-12-2012, 10:31 AM
Last Post: seminar details
  IP MULTICAST ROUTING project report helper 2 5,914 20-12-2012, 10:31 AM
Last Post: seminar details
  Secure Data Transmission PPT seminar surveyer 2 3,429 24-11-2012, 01:35 PM
Last Post: seminar details
  Distributed Cache Updating for the Dynamic Source Routing Protocol seminar class 3 2,286 17-11-2012, 01:26 PM
Last Post: seminar details
  A SURVEY OF QoS ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS project report helper 1 2,002 07-11-2012, 12:42 PM
Last Post: seminar details
  routing Protocols presentation project topics 1 3,836 07-11-2012, 12:42 PM
Last Post: seminar details

Forum Jump: