Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Network support for IP traceback
IEEE/ACM Transactions on Networking (TON)
An algebraic approach to IP traceback
ACM Transactions on Information and System Security (TISSEC)
Network tomography from measured end-to-end delay covariance
IEEE/ACM Transactions on Networking (TON)
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Secure operation of mobile ad-hoc networks requires the ability to track the flow of traffic through the network. Knowledge of the path of a packet allows inference of correct operation or potential attacks. In prior work, we have described a number of different techniques for recording such path information and ensuring its correctness through cryptographic techniques. In this paper, we evaluate these path recording techniques in a realistic military scenario. Using topology information and traffic traces from the Lakehurst scenario, we provide a quantitative evaluation of our techniques and determine the overhead for path recording in terms of data structure size and computational requirements.