Abstract

In network communication, Byzantine attacks, i.e., attacks in consequence of the packet dropping and cheating (modified packets), are usually difficult to guard against. Several multi-path packet routing schemes have been recently proposed to recover lost packets on account of the packet dropping (caused by path failures or attacks), but no effective solutions have been proposed to counter cheating attacks. To this end, we propose a novel approach in multi-path routing to improve resilience to Byzantine attacks. In our approach, we present a multipath source routing scheme based on Prüfer number which allows the receiver to identify packet dropping paths. We also propose a multi-path coding scheme based on ReedSolomon error-correcting coding scheme which allows the receiver to identify paths that cheat. If (n, k) RS coding scheme is used, our v(≥ 3) node-disjoint paths routing scheme is resilient to t = (n - k)/2 faulty paths, i.e., up to t faulty paths can be identified and the original message can be recovered. Our scheme does not involve interactive communications between the source and the destination. Additionally, we propose a path selection scheme which enables a node to select the most reliable paths (isolating faulty nodes) to transmit data. Our robustness analysis also discusses the tradeoffs between using the single path routing and multi-path routing.

Original languageEnglish (US)
Title of host publicationMILCOM 2009 - 2009 IEEE Military Communications Conference
DOIs
StatePublished - Dec 1 2009
Event2009 IEEE Military Communications Conference, MILCOM 2009 - Boston, MA, United States
Duration: Oct 18 2009Oct 21 2009

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Other

Other2009 IEEE Military Communications Conference, MILCOM 2009
CountryUnited States
CityBoston, MA
Period10/18/0910/21/09

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Secure multi-path DATA deliver in sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Huang, D. (2009). Secure multi-path DATA deliver in sensor networks. In MILCOM 2009 - 2009 IEEE Military Communications Conference [5379954] (Proceedings - IEEE Military Communications Conference MILCOM). https://doi.org/10.1109/MILCOM.2009.5379954