DocumentCode :
1826168
Title :
Distributed algorithms for secure multipath routing
Author :
Lee, Patrick P C ; Misra, Mshal ; Rubenstein, Dan
Author_Institution :
Dept. of Comput. Sci., Columbia Univ., New York, NY, USA
Volume :
3
fYear :
2005
fDate :
13-17 March 2005
Firstpage :
1952
Abstract :
To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple paths so that intruders require much more resources to mount successful attacks. Our work exhibits several crucial properties that differentiate itself from previous approaches. They include (1) distributed routing decisions: routing decisions are made without the centralized information of the entire network topology, (2) bandwidth-constraint adaptation: the worst-case link attack is mitigated for any feasible session throughput subject to the link-bandwidth constraints, and (3) lexicographic protection: severe link attacks are suppressed based on lexicographic optimization. We devise two algorithms for the solution, termed the bound-control algorithm and the lex-control algorithm, and prove their convergence to the respective optimal solutions. Experiments show that the bound-control algorithm is more effective to prevent the worst-case single-link attack when compared to the single-path approach, and that the lex-control algorithm further enhances the bound-control algorithm by countering severe single-link attacks and various models of multi-link attacks. Moreover, the lex-control algorithm offers prominent protection after only a few execution rounds. Thus, system designers can sacrifice minimal routing security for significantly improved algorithm performance when deploying the distributed secure multipath solution.
Keywords :
convergence; data communication; distributed algorithms; graph theory; minimax techniques; multipath channels; telecommunication links; telecommunication network routing; telecommunication security; bandwidth-constraint adaptation; bound-control algorithm; convergence; distributed routing decision; distributed secure multipath solution; graph theory; lex-control algorithm; lexicographic optimization; lexicographic protection; link-bandwidth constraint; minimal routing security; minimax optimization; network topology; secure multipath routing; single-path data session; worst-case link attack; Bandwidth; Computer crime; Computer science; Constraint optimization; Data security; Distributed algorithms; Network topology; Optimal control; Routing protocols; Throughput;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
ISSN :
0743-166X
Print_ISBN :
0-7803-8968-9
Type :
conf
DOI :
10.1109/INFCOM.2005.1498473
Filename :
1498473
Link To Document :
بازگشت