Securing every bit: authenticated broadcast in radio networks

  • Authors:
  • Dan Alistarh;Seth Gilbert;Rachid Guerraoui;Zarko Milosevic;Calvin Newport

  • Affiliations:
  • Swiss Federal Institute of Technology Lausanne (EPFL), Lausanne, Switzerland;Swiss Federal Institute of Technology Lausanne (EPFL), Lausanne, Switzerland;Swiss Federal Institute of Technology Lausanne (EPFL), Lausanne, Switzerland;Swiss Federal Institute of Technology Lausanne (EPFL), Lausanne, Switzerland;Massachusetts Institute of Technology, Boston, MA, USA

  • Venue:
  • Proceedings of the twenty-second annual ACM symposium on Parallelism in algorithms and architectures
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, NeighborWatchRB, makes use of a novel strategy in which honest devices monitor their neighbors for malicious behavior. Second, we present a more robust variant, MultiPathRB, that tolerates the maximum possible density of malicious devices per region, using an elaborate voting strategy. We also introduce a new proof technique to show that both protocols ensure asymptotically optimal running time. We demonstrate the fault tolerance of our protocols through extensive simulation. Simulations show the practical superiority of the NeighborWatchRB protocol (an advantage hidden in the constants of the asymptotic complexity). The NeighborWatchRB protocol even performs relatively well when compared to the simple, fast epidemic protocols commonly used in the radio setting, protocols that tolerate no malicious faults. We therefore believe that the overhead for ensuring authenticated broadcast is reasonable, especially in applications that use authenticated broadcast only when necessary, such as distributing an authenticated digest