DocumentCode
2397575
Title
Byzantine attack with anypath routing in wireless mesh networks
Author
Zhong, Lujie ; Xu, Changqiao
Author_Institution
Inf. Eng. Coll., Capital Normal Univ., Beijing, China
fYear
2010
fDate
26-28 Oct. 2010
Firstpage
711
Lastpage
715
Abstract
In this paper, we propose a new routing scheme that optimizes the anypath routing protocol with Byzantine attack resident. In anypath routing scheme, each node uses a set of next-hops and selected wormhole list privileges to decide the next-hops. Currently, anypath is still an open issue in wireless mesh networks. In this paper, we bring the Byzantine attack to the anypath routing protocol which could avoid the attacks and thus improve the delivery ratio. We propose the use of an authentication framework in which nodes need the appropriate credentials to participate in the anypath routing protocol as forwarding set member. We also use controlled suspicious mechanism in which a node that detects malicious behavior will flood a control messages to all the nodes in this network. All the others node will monitor the behavior. The simulation results show that with our proposed scheme, the routing protocol is less affected by the attacker.
Keywords
routing protocols; wireless mesh networks; Byzantine attack; anypath routing; next-hops; routing protocols; selected wormhole list privileges; suspicious mechanism; wireless mesh networks; Mesh networks; Protocols; Routing; Anypath Routing; Byzantine Attack; Wireless Mesh Networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Broadband Network and Multimedia Technology (IC-BNMT), 2010 3rd IEEE International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-6769-3
Type
conf
DOI
10.1109/ICBNMT.2010.5705182
Filename
5705182
Link To Document