"A clean slate design for secure wireless ad-hoc networks #x2014; Part 2: Open unsynchronized networks"
Title | "A clean slate design for secure wireless ad-hoc networks #x2014; Part 2: Open unsynchronized networks" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | J. Ponniah, Y. C. Hu, P. R. Kumar |
Conference Name | 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) |
Date Published | May |
Publisher | IEEE |
ISBN Number | 978-3-9018-8274-6 |
Accession Number | 15290745 |
Keywords | Ad hoc networks, cleanslate, Clocks, Games, min-max utility, Protocols, pubcrawl170103, Schedules, Synchronization, telecommunication security, Throughput, unsynchronized nodes, wireless ad-hoc networks security |
Abstract | We build upon the clean-slate, holistic approach to the design of secure protocols for wireless ad-hoc networks proposed in part one. We consider the case when the nodes are not synchronized, but instead have local clocks that are relatively affine. In addition, the network is open in that nodes can enter at arbitrary times. To account for this new behavior, we make substantial revisions to the protocol in part one. We define a game between protocols for open, unsynchronized nodes and the strategies of adversarial nodes. We show that the same guarantees in part one also apply in this game: the protocol not only achieves the max-min utility, but the min-max utility as well. That is, there is a saddle point in the game, and furthermore, the adversarial nodes are effectively limited to either jamming or conforming with the protocol. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7151071&isnumber=7151020 |
DOI | 10.1109/WIOPT.2015.7151071 |
Citation Key | 7151071 |