Queuing the Trust: Secure Backpressure Algorithm against Insider Threats in Wireless Networks

被引:0
|
作者
Lu, Zhuo [1 ]
Sagduyu, Yalin E. [2 ]
Li, Jason H. [2 ]
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The backpressure algorithm is known to provide throughput optimality in routing and scheduling decisions for multi-hop networks with dynamic traffic. The essential assumption in the backpressure algorithm is that all nodes are benign and obey the algorithm rules governing the information exchange and underlying optimization needs. Nonetheless, such an assumption does not always hold in realistic scenarios, especially in the presence of security attacks with intent to disrupt network operations. In this paper, we propose a novel mechanism, called virtual trust queuing, to protect backpressure algorithm based routing and scheduling protocols from various insider threats. Our objective is not to design yet another trust-based routing to heuristically bargain security and performance, but to develop a generic solution with strong guarantees of attack resilience and throughput performance in the backpressure algorithm. To this end, we quantify a node's algorithm-compliance behavior over time and construct a virtual trust queue that maintains deviations from expected algorithm outcomes. We show that by jointly stabilizing the virtual trust queue and the real packet queue, the backpressure algorithm not only achieves resilience, but also sustains the throughput performance under an extensive set of security attacks.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Trust-aware and improved density peaks clustering algorithm for fast and secure models in wireless sensor networks
    Han, Youjia
    Wang, Huibin
    Li, Yueheng
    Zhang, Lili
    PERVASIVE AND MOBILE COMPUTING, 2024, 105
  • [42] Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks
    Awan, Saba
    Javaid, Nadeem
    Ullah, Sameeh
    Khan, Asad Ullah
    Qamar, Ali Mustafa
    Choi, Jin-Ghoo
    SENSORS, 2022, 22 (02)
  • [43] Adaptive Trust Model for Secure Geographic Routing in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 394 - 399
  • [44] Trust-Distrust Protocol for the Secure Routing In Wireless Sensor Networks
    Karthick, S.
    Devi, E. Sree
    Nagarajan, R. V.
    2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [45] Trust-aware secure routing protocol for wireless sensor networks
    Hu, Huangshui
    Han, Youjia
    Wang, Hongzhi
    Yao, Meiqin
    Wang, Chuhang
    ETRI JOURNAL, 2021, 43 (04) : 674 - 683
  • [46] Trust based Secure Reliable Route Discovery in Wireless Mesh Networks
    Navmani, T. M.
    Yogesh, P.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (07) : 3386 - 3411
  • [47] A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
    Kumar, Gulshan
    Rai, Mritunjay Kumar
    Kim, Hye-jin
    Saha, Rahul
    MOBILE INFORMATION SYSTEMS, 2017, 2017
  • [48] A Gradient-Assisted Energy-Efficient Backpressure Scheduling Algorithm for Wireless Sensor Networks
    Jiao, Zhenzhen
    Tian, Rui
    Zhang, Baoxian
    Li, Cheng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [49] Secure positioning of wireless sensor networks against wormhole attacks
    Yu, Xiuwu
    Wang, Xun
    Liu, Yong
    TELECOMMUNICATION SYSTEMS, 2024, 87 (03) : 835 - 843
  • [50] Designing an efficient preemptive priority based handoff queuing algorithm for wireless networks
    Banerjee, Amitava
    Misra, Iti Saha
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 498 - +