SFMD: A secure data forwarding and malicious routers detecting protocol

被引:1
|
作者
Yang, Xiang-He [1 ]
Hu, Hua-Ping [1 ]
Chen, Xin [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Peoples R China
关键词
communication security; secure data forwarding; malicious routers detecting;
D O I
10.1109/ARES.2008.74
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Network routers play a key role in modern network communications and are attractive targets to attackers. By mistakenly forwarding, dropping, eavesdropping or modifying packets, malicious routers are great threat to network communications. Most papers emphasize particularly on securing routing protocols. In this paper, we present a protocol providing securely data packet forwarding with Byzantine robustness. The protocol has low overhead, low processing requirements and can detect misbehavior quickly. Through the simulation, our protocol increases throughput by 10% in the presence of 10% malicious nodes, and by 19% in the presence of 20% malicious nodes. Also, due to the authentication method, our protocol is suitable for wireless Ad Hoc networks.
引用
收藏
页码:484 / 490
页数:7
相关论文
共 50 条
  • [31] Privacy preserving set intersection protocol secure against malicious behaviors
    Sang, Yingpeng
    Shen, Hong
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 461 - 468
  • [32] Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks
    Lin, Chu-Hsing
    Lai, Wei-Shen
    Huang, Yen-Lin
    Chou, Mei-Chun
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1272 - +
  • [33] RETRACTED ARTICLE: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET
    R. Thiagarajan
    R. Ganesan
    V. Anbarasu
    M. Baskar
    K. Arthi
    J. Ramkumar
    Wireless Personal Communications, 2021, 119 : 21 - 35
  • [34] Retraction Note: Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET
    R. Thiagarajan
    R. Ganesan
    V. Anbarasu
    M. Baskar
    K. Arthi
    J. Ramkumar
    Wireless Personal Communications, 2023, 128 : 731 - 732
  • [35] Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    Liu, DG
    Ning, P
    Du, WL
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, : 609 - 619
  • [36] Deep Learning Approach for Detecting Malicious Activities Over Encrypted Secure Channels
    Yang, Jiwon
    Lim, Hyuk
    IEEE ACCESS, 2021, 9 : 39229 - 39244
  • [37] Chaining watermarks for detecting malicious modifications to streaming data
    Guo, Huiping
    Li, Yingjiu
    Jajodia, Sushil
    INFORMATION SCIENCES, 2007, 177 (01) : 281 - 298
  • [38] Detecting and blocking malicious traffic caused by IRC protocol based botnets
    Chi, Zhenhua
    Zhao, Zixiang
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 485 - 489
  • [39] A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
    Lin, Hsiao-Ying
    Tzeng, Wen-Guey
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 995 - 1003
  • [40] Topology Refresh Data Forwarding Protocol for Opportunistic Networks
    Lau, Peter S.
    2015 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2015,