The MAFT Architecture for Distributed Fault Tolerance
IEEE Transactions on Computers - Fault-Tolerant Computing
Design & analysis of fault tolerant digital systems
Design & analysis of fault tolerant digital systems
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Exploiting Omissive Faults in Synchronous Approximate Agreement
IEEE Transactions on Computers
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Byzantine generals in action: implementing fail-stop processors
ACM Transactions on Computer Systems (TOCS)
Highly-resilient, energy-efficient multipath routing in wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
Survivable mobile wireless networks: issues, challenges, and research directions
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Consensus With Dual Failure Modes
IEEE Transactions on Parallel and Distributed Systems
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
MP-DSR: A QoS-Aware Multi-Path Dynamic Source Routing Protocol for Wireless Ad-Hoc Networks
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
On-Demand Multi Path Distance Vector Routing in Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Agent Survivability: An Application for Strong andWeak Chain Constrained Scheduling
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 9 - Volume 9
A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Networks " How Much Can Watchdogs Really Do?
WMCSA '04 Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications
Label Switched Multi-path Forwarding in Wireless Ad-Hoc Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
QoS topology control for nonhomogenous ad hoc wireless networks
EURASIP Journal on Wireless Communications and Networking
TCP-M: multiflow transmission control protocol for ad hoc networks
EURASIP Journal on Wireless Communications and Networking
Redundancy management technique for space shuttle computers
IBM Journal of Research and Development
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Dynamic hybrid fault models and the applications to wireless sensor networks (WSNs)
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Neighborhood monitoring in ad hoc networks
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Advanced faults patterns for WSN dependability benchmarking
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
Hi-index | 0.00 |
A new approach to modeling wireless networks is presented that allows for the determination of network reliability using diverse fault assumptions. It is shown that one can exploit network topologies by taking advantage of the broadcast paradigm of wireless communication to detect and possibly correct benign and malicious act. Specifically, a general wireless network model is presented that maps subsets of the network to a join graphs of cliques. This join graph allows for horizontal and orthogonal cross-monitoring, which exposes the theoretical limitations of fault detection and correction. For ad hoc and sensor networks the two-dimensional cross-monitoring scheme offers great flexibility with respect to establishing topologies capable of meeting reliability and survivability requirements. Recent approaches addressing tolerance to "misbehaving" nodes are shown to be special cases of the general model.