BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN ADHOC NETWORK
S. Albert Raebra1 and S.Vijayalakshmi2
1Department of Computer Science, St.Joseph’s College, Bharathidasan University,Trichy, India
2Department of Banking Technology, Pondicherry University, India
ABSTRACT
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise and subversion of the authenticated, trusted and participating node in the network leads to Byzantine attack or behavior. Attacks where adversaries have full control of a number of authenticated devices and behave arbitrarily to disrupt the multicast routing are referred to as Byzantine attacks. Online auction network inherently embracing multicast technology has been taken as the case study. The implications of the Byzantine attack in the online auction Network have been studied. Besides the existing network performance parameters like delay, jitter, throughput, Packet Delivery Ratio (PDR) another parameter by name Immediate Neighbor Aware Vouch Count ( INAVC) is included to proactively select a fault free multicast route. This proactive parameter is dynamic and reflects the true multicast architecture in adhoc network thereby enabling to instantly prune the Byzantine adversary. Providing robust and resilient defense solutions to subvert this attack in auction Network becomes the focus of this paper.
KEYWORDS
Ad-hoc networks, Multicast Communication, Byzantine Behavior, Online Auction Network
Original Source Link : http://airccse.org/journal/nsa/0710ijnsa08.pdf
No comments:
Post a Comment