Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
 
<< vorige    volgende >>
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
           Alle artikelen van de bijbehorende aflevering
                                       Details van artikel 4 van 13 gevonden artikelen
 
 
  BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN ADHOC NETWORK
 
 
Titel: BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN ADHOC NETWORK
Auteur: S. Albert Raebra
S.Vijayalakshmi
Verschenen in: International journal of network security & its applications
Paginering: Jaargang 2 (2010) nr. 3 pagina's 119-130
Jaar: 2010
Inhoud: Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicastcommunication. The security challenges faced by the network due to their inherent unique characteristicsare exacerbated in case of multicast communication. Group communication in ad hoc network issusceptible to a host of outsider and insider attacks. The security solutions proposed for the outsiderattack cannot be directly applied to the insider attack due to their disparate behavior. The compromiseand subversion of the authenticated, trusted and participating node in the network leads to Byzantineattack or behavior. Attacks where adversaries have full control of a number of authenticated devices andbehave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auctionnetwork inherently embracing multicast technology has been taken as the case study. The implications ofthe Byzantine attack in the online auction Network have been studied. Besides the existing networkperformance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameterby name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault freemulticast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhocnetwork thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilientdefense solutions to subvert this attack in auction Network becomes the focus of this paper.
Uitgever: Academy & Industry Research Collaboration Center (AIRCC) (provided by DOAJ)
Bronbestand: Elektronische Wetenschappelijke Tijdschriften
 
 

                             Details van artikel 4 van 13 gevonden artikelen
 
<< vorige    volgende >>
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland