Survey on distributed detection mechanism for Byzantine attack in tree-based topology

Apeksha. B. Dhakde, Dr.Sonali Nimbhorkar(Ridhorkar)
{"title":"Survey on distributed detection mechanism for Byzantine attack in tree-based topology","authors":"Apeksha. B. Dhakde, Dr.Sonali Nimbhorkar(Ridhorkar)","doi":"10.1109/ICCPEIC.2014.6915338","DOIUrl":null,"url":null,"abstract":"In tree based topology each and every nodes are participating on communication with other nodes. So it is major challenge to secure the data transmission between the nodes in the network as many types of attacks are generated in between the communication. Byzantine attack is one of the most important security thread as it interrupt the communication of nodes in the network and behave like a innocent nodes while participating normally. In Byzantine attack compromisation of nodes takes place in that condition it is very difficult to detect the innocent and malicious nodes, with the byzantine nodes many other attacks are deployed as Blackhole attack, wormhole attack, gray-hole attack, flood rushing attack, sinkhole attack etc. Routing protocols helps to provide the way through which the nodes can be able to communicate with each other. Also provide the cost associated with each node so as to differentiate investment of resources from each node as communication takes place. For securing the data transmission in a network algorithms proposed which will bound the faulty data transmission and also limits the resources usage by decreasing the investment of resources which takes part in communication. Performance will be measures in terms of parameter as packet delivery fraction, energy consumption, and End-to-end delays.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPEIC.2014.6915338","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In tree based topology each and every nodes are participating on communication with other nodes. So it is major challenge to secure the data transmission between the nodes in the network as many types of attacks are generated in between the communication. Byzantine attack is one of the most important security thread as it interrupt the communication of nodes in the network and behave like a innocent nodes while participating normally. In Byzantine attack compromisation of nodes takes place in that condition it is very difficult to detect the innocent and malicious nodes, with the byzantine nodes many other attacks are deployed as Blackhole attack, wormhole attack, gray-hole attack, flood rushing attack, sinkhole attack etc. Routing protocols helps to provide the way through which the nodes can be able to communicate with each other. Also provide the cost associated with each node so as to differentiate investment of resources from each node as communication takes place. For securing the data transmission in a network algorithms proposed which will bound the faulty data transmission and also limits the resources usage by decreasing the investment of resources which takes part in communication. Performance will be measures in terms of parameter as packet delivery fraction, energy consumption, and End-to-end delays.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于树的拜占庭攻击分布式检测机制研究
在基于树的拓扑结构中,每个节点都参与与其他节点的通信。因此,网络中节点之间的数据传输安全是一个重大挑战,因为节点之间的通信会产生多种类型的攻击。拜占庭攻击是最重要的安全线程之一,它中断网络中节点的通信,在正常参与的情况下表现得像一个无辜的节点。在拜占庭攻击中,节点的妥协发生在这种情况下,很难检测到无辜和恶意的节点,拜占庭节点部署了许多其他攻击,如黑洞攻击,虫洞攻击,灰洞攻击,洪水攻击,天坑攻击等。路由协议有助于提供节点之间相互通信的方式。还提供与每个节点相关的成本,以便在通信发生时区分每个节点的资源投资。为了保证网络中数据传输的安全,提出了一种算法,该算法既可以约束错误的数据传输,又可以通过减少参与通信的资源投入来限制资源的使用。性能将根据诸如数据包传送率、能耗和端到端延迟等参数来衡量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Multilevel inverter using series connected sub-multilevel topology with selective harmonic reduction Optimal placement and control of TCSC for transmission congestion management Identification of real-time active hand movements EMG signals for control of prosthesis robotic hand Unbalance and voltage fluctuation study on AC traction system Detailed analysis of grid connected distributed generation based hybrid system under different fault conditions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1