An OnDemand Secure Routing Protocol Resilient to Byzantine Failures
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#1
07-10-2010, 04:25 PM



.pdf   wise2002_sec_routing.pdf (Size: 152.5 KB / Downloads: 41)

OnDemand
Secure Routing Protocol Resilient to
Byzantine Failures


Baruch Awerbuch, David Holmer, Cristina NitaRotaru
and Herbert Rubens
Department of Computer Science
Johns Hopkins University
3400 North Charles St.
Baltimore, MD 21218 USA


ABSTRACT

An ad hoc wireless network is an autonomous self-organizing system of mobile nodes connected by wireless links where nodes not in direct range can communicate via intermediate nodes. A common technique used in routing protocols for ad hoc wireless networks is to establish the routing paths ondemand, as opposed to continually maintaining a complete routing table. A signi
cant concern in routing is the ability to function in the presence of byzantine failures which include nodes that drop, modify, or mis-route packets in an attempt to disrupt the routing service. We propose an on-demand routing protocol for ad hoc wireless networks that provides resilience to byzantine failures caused by individual or colluding nodes. Our adaptive probing technique detects a malicious link after log n faults have occurred, where n is the length of the path. These links are then avoided by multiplicatively increasing their weights and by using an on-demand route discovery protocol that
nds a least weight path to the destination.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,449 31-03-2015, 09:08 AM
Last Post: Guest
  secure atm by image processing jaseelati 0 286 10-02-2015, 01:33 PM
Last Post: jaseelati
  secure atm by image processing abstract jaseelati 0 351 23-01-2015, 03:08 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,327 13-09-2014, 02:35 PM
Last Post: Radhika.m
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,700 13-05-2014, 10:16 AM
Last Post: seminar project topic
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,152 24-03-2014, 02:51 PM
Last Post: seminar project topic
  Open Secure Shell seminar ideas 4 4,097 27-09-2013, 10:05 AM
Last Post: seminar projects maker
  Open Core Protocol ( OCP ) An Introduction to Interface Specification seminar projects maker 0 536 24-09-2013, 12:29 PM
Last Post: seminar projects maker
  Report on 3-D Secure seminar projects maker 0 374 21-09-2013, 04:46 PM
Last Post: seminar projects maker
  Routing in Wireless Ad Hoc Networks pdf seminar projects maker 0 321 21-09-2013, 01:05 PM
Last Post: seminar projects maker