SFMD: A secure data forwarding and malicious routers detecting protocol

被引:1
|
作者
Yang, Xiang-He [1 ]
Hu, Hua-Ping [1 ]
Chen, Xin [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Peoples R China
关键词
communication security; secure data forwarding; malicious routers detecting;
D O I
10.1109/ARES.2008.74
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network routers play a key role in modern network communications and are attractive targets to attackers. By mistakenly forwarding, dropping, eavesdropping or modifying packets, malicious routers are great threat to network communications. Most papers emphasize particularly on securing routing protocols. In this paper, we present a protocol providing securely data packet forwarding with Byzantine robustness. The protocol has low overhead, low processing requirements and can detect misbehavior quickly. Through the simulation, our protocol increases throughput by 10% in the presence of 10% malicious nodes, and by 19% in the presence of 20% malicious nodes. Also, due to the authentication method, our protocol is suitable for wireless Ad Hoc networks.
引用
收藏
页码:484 / 490
页数:7
相关论文
共 50 条
  • [1] Detecting and isolating malicious routers
    Mizrak, Alper Tugay
    Cheng, Yu-Chung
    Marzullo, Keith
    Savage, Stefan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (03) : 230 - 244
  • [2] Fatih: Detecting and isolating malicious routers
    Mizrak, AT
    Cheng, YC
    Marzullo, K
    Savage, S
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 538 - 547
  • [3] Detecting compromised routers via pocket forwarding behavior
    Mizrak, Alper T.
    Savage, Stefan
    Marzullo, Keith
    IEEE NETWORK, 2008, 22 (02): : 34 - 39
  • [4] A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor networks
    Jiang, Yuan-xi
    Zhao, Bao-hua
    2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 49 - 55
  • [5] Detecting malicious inclusions in secure hardware:Challenges and solutions
    Wang, Xiaoxiao
    Tehranipoor, Mohammad
    Plusquellic, Jim
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 15 - +
  • [6] A Secure Data Forwarding In Cloud Storage
    Prabha, K.
    Nalini, S.
    2013 INTERNATIONAL CONFERENCE ON OPTICAL IMAGING SENSOR AND SECURITY (ICOSS 2013), 2013,
  • [7] A New Secure Data Forwarding Protocol with Fault Detection for Wireless Ad Hoc Networks
    Xu, Li
    Chen, Si-Shen
    Mu, Yi
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2238 - +
  • [8] A Secure Data Forwarding Protocol for Data Statistic Services in Multi-Hop Marine Sensor Networks
    Wei, Lifei
    Zhang, Kai
    Zhang, Lei
    Huang, Dongmei
    FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 63 - 78
  • [9] A Secure Scalar Product Protocol Against Malicious Adversaries
    Bo Yang
    Yong Yu
    Chung-Huang Yang
    Journal of Computer Science and Technology, 2013, 28 : 152 - 158
  • [10] A Secure Scalar Product Protocol Against Malicious Adversaries
    Yang, Bo
    Yu, Yong
    Yang, Chung-Huang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 152 - 158