• DocumentCode
    2397575
  • Title

    Byzantine attack with anypath routing in wireless mesh networks

  • Author

    Zhong, Lujie ; Xu, Changqiao

  • Author_Institution
    Inf. Eng. Coll., Capital Normal Univ., Beijing, China
  • fYear
    2010
  • fDate
    26-28 Oct. 2010
  • Firstpage
    711
  • Lastpage
    715
  • Abstract
    In this paper, we propose a new routing scheme that optimizes the anypath routing protocol with Byzantine attack resident. In anypath routing scheme, each node uses a set of next-hops and selected wormhole list privileges to decide the next-hops. Currently, anypath is still an open issue in wireless mesh networks. In this paper, we bring the Byzantine attack to the anypath routing protocol which could avoid the attacks and thus improve the delivery ratio. We propose the use of an authentication framework in which nodes need the appropriate credentials to participate in the anypath routing protocol as forwarding set member. We also use controlled suspicious mechanism in which a node that detects malicious behavior will flood a control messages to all the nodes in this network. All the others node will monitor the behavior. The simulation results show that with our proposed scheme, the routing protocol is less affected by the attacker.
  • Keywords
    routing protocols; wireless mesh networks; Byzantine attack; anypath routing; next-hops; routing protocols; selected wormhole list privileges; suspicious mechanism; wireless mesh networks; Mesh networks; Protocols; Routing; Anypath Routing; Byzantine Attack; Wireless Mesh Networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Broadband Network and Multimedia Technology (IC-BNMT), 2010 3rd IEEE International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-6769-3
  • Type

    conf

  • DOI
    10.1109/ICBNMT.2010.5705182
  • Filename
    5705182