Synchronizing clocks in the presence of faults
Journal of the ACM (JACM)
Reaching approximate agreement in the presence of faults
Journal of the ACM (JACM)
New Hybrid Fault Models for Asynchronous Approximate Agreement
IEEE Transactions on Computers
Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems
IEEE Transactions on Parallel and Distributed Systems
The Timed Asynchronous Distributed System Model
IEEE Transactions on Parallel and Distributed Systems
Clock synchronization with faults and recoveries (extended abstract)
Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Time bounded medium access control for ad hoc networks
Proceedings of the second ACM international workshop on Principles of mobile computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Security-Aware Adaptive Dynamic Source Routing Protoco
LCN '02 Proceedings of the 27th Annual IEEE Conference on Local Computer Networks
Replica Allocation in Ad Hoc Networks with Periodic Data Update
MDM '02 Proceedings of the Third International Conference on Mobile Data Management
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Reliable MAC Layer Multicast in IEEE 802.11 Wireless Networks
ICPP '02 Proceedings of the 2002 International Conference on Parallel Processing
Fault Tolerance in Collaborative Sensor Networks for Target Detection
IEEE Transactions on Computers
Hardware Support for High Performance, Intrusion- and Fault-Tolerant Systems
SRDS '04 Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Key agreement in ad hoc networks
Computer Communications
Hi-index | 0.00 |
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where local node interaction is used to neutralize errors/attacks at the source, both preventing errors/attacks from propagating in the network and improving the fidelity of the propagated information. We achieve this goal by combining statistical (a proposed fault-tolerant cluster algorithm) and security (threshold cryptography) techniques with application-aware checks to exploit the data/computation that is partially and naturally replicated in wireless applications. We have prototyped an inner-circle framework and used it to demonstrate the idea of inner-circle consistency in two significant wireless scenarios: 1) the neutralization of black hole attacks in AODV networks and 2) the neutralization of sensor errors in a target detection/localization application executed over a wireless sensor network.