FORBID: Cope with Byzantine behaviors in wireless multi-path routing and forwarding

Xueyuan Su, Gang Peng, Sammy Chan

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

6 Citations (Scopus)

Abstract

Consider multi-path routing and forwarding scenarios in wireless ad hoc networks. Rational and Byzantine nodes both might deviate from the protocol. However, their intentions and behaviors are different. To extend our previous work on generalized second price (GSP) auction for stimulating rational nodes for cooperation, we propose FORBID mechanism in this work to cope with Byzantine behaviors. The core of the FORBID mechanism is a decentralized reputation system. Based on available evidence, each node relies on Bayesian inference to internally update its reputation beliefs that how reliable each other node is. Different from the passive overhearing techniques such as ''watchdog'', each source node under FORBID actively triggers detection process to collect evidence towards Byzantine behaviors. In addition, FORBID includes a flocking algorithm to allow careful dissemination of reputation information and thus shortens the misbehavior detection time. © 2011 IEEE.
Original languageEnglish
Title of host publicationGLOBECOM - IEEE Global Telecommunications Conference
DOIs
Publication statusPublished - 2011
Event54th Annual IEEE Global Telecommunications Conference: "Energizing Global Communications", GLOBECOM 2011 - Houston, TX, United States
Duration: 5 Dec 20119 Dec 2011

Conference

Conference54th Annual IEEE Global Telecommunications Conference: "Energizing Global Communications", GLOBECOM 2011
PlaceUnited States
CityHouston, TX
Period5/12/119/12/11

Research Keywords

  • Bayesian inference
  • flocking algorithm
  • multi-path routing and forwarding
  • Wireless ad hoc networks

Fingerprint

Dive into the research topics of 'FORBID: Cope with Byzantine behaviors in wireless multi-path routing and forwarding'. Together they form a unique fingerprint.

Cite this