Queuing the Trust: Secure Backpressure Algorithm against Insider Threats in Wireless Networks

被引:0
|
作者
Lu, Zhuo [1 ]
Sagduyu, Yalin E. [2 ]
Li, Jason H. [2 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The backpressure algorithm is known to provide throughput optimality in routing and scheduling decisions for multi-hop networks with dynamic traffic. The essential assumption in the backpressure algorithm is that all nodes are benign and obey the algorithm rules governing the information exchange and underlying optimization needs. Nonetheless, such an assumption does not always hold in realistic scenarios, especially in the presence of security attacks with intent to disrupt network operations. In this paper, we propose a novel mechanism, called virtual trust queuing, to protect backpressure algorithm based routing and scheduling protocols from various insider threats. Our objective is not to design yet another trust-based routing to heuristically bargain security and performance, but to develop a generic solution with strong guarantees of attack resilience and throughput performance in the backpressure algorithm. To this end, we quantify a node's algorithm-compliance behavior over time and construct a virtual trust queue that maintains deviations from expected algorithm outcomes. We show that by jointly stabilizing the virtual trust queue and the real packet queue, the backpressure algorithm not only achieves resilience, but also sustains the throughput performance under an extensive set of security attacks.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Securing the Backpressure Algorithm for Wireless Networks
    Lu, Zhuo
    Sagduyu, Yalin E.
    Li, Jason H.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (04) : 1136 - 1148
  • [2] Trust Evaluation Model against Insider Attack in Wireless Sensor Networks
    Lu, Yifan
    Lin, Kai
    Li, Keqiu
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 319 - 326
  • [3] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39
  • [4] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729
  • [5] Secure Data Aggregation Algorithm Based on Trust in Wireless Sensor Networks
    Guo, Rui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 809 - 813
  • [6] Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks
    Choi, Jaewoo
    Bang, Jihyun
    Kim, LeeHyung
    Ahn, Mirim
    Kwon, Taekyoung
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 494 - 502
  • [7] A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
    Cho, Youngho
    Qu, Gang
    SENSORS, 2023, 23 (09)
  • [8] Wireless sensor networks secure routing algorithm based on trust value computation
    Xu, Qingzeng
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2021, 14 (01) : 10 - 15
  • [9] A Secure Data Fusion Algorithm Based on Behavior Trust in Wireless Sensor Networks
    Zhu Cheng
    Zhou Ming-Zheng
    Xu Jin-Sheng
    Ye Qing
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4623 - 4626
  • [10] A Secure Data Aggregation Algorithm Based on Behavior Trust in Wireless Sensor Networks
    Zhou, Ming-Zheng
    Xu, Jin-Sheng
    Zhu, Cheng
    SEC 2008: PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING, 2008, : 61 - 66