Show simple item record

Of Malicious Motes and Suspicious Sensors

dc.date.accessioned2006-04-19T17:01:59Z
dc.date.accessioned2018-11-24T10:24:48Z
dc.date.available2006-04-19T17:01:59Z
dc.date.available2018-11-24T10:24:48Z
dc.date.issued2006-04-19
dc.identifier.urihttp://hdl.handle.net/1721.1/32534
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/32534
dc.description.abstractHow much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. By broadcasting at the same time as Alice orBob, Collin can destroy their messages or overwhelm them with his ownmalicious data. Being a tiny device, however, Collin can onlybroadcast up to B times. Given that Alice and Bob do not knowB, and cannot distinguish honest from malicious messages, howlong can Collin prevent them from communicating? We show the answerto be 2B + Theta(lg|V|) communication rounds, where V is theset of values that Alice and Bob may transmit. We prove this resultto be optimal by deriving an algorithm that matches our lowerbound---even in the stronger case where Alice and Bob do not start thegame at the same time.We then argue that this specific 3-player game captures the generalextent to which a malicious adversary can disrupt coordination in asingle-hop wireless network. We support this claim by deriving---via reduction from the 3-player game---round complexity lower boundsfor several classical n-player problems: 2B + Theta(lg|V|) for reliable broadcast,2B + Omega(lg(n/k)) for leader election among k contenders,and 2B + Omega(k*lg(|V|/k)) for static k-selection. We then consider an extension of our adversary model that also includes up to t crash failures. We study binary consensus as the archetypal problem for this environment and show a bound of 2B + Theta(t) rounds. We conclude by providing tight, or nearly tight, upper bounds for all four problems. The new upper and lower bounds in this paper represent the first such results for a wireless network in which the adversary has the ability to disrupt communication.
dc.format.extent20 p.
dc.format.extent22447191 bytes
dc.format.extent841434 bytes
dc.language.isoen_US
dc.subjectwireless ad hoc networks
dc.subjectbyzantine
dc.subjectreliable broadcast
dc.subjectleader election
dc.subjectk-selection
dc.subjectconsensus
dc.subjectcollision detection
dc.titleOf Malicious Motes and Suspicious Sensors


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2006-026.pdf841.4Kbapplication/pdfView/Open
MIT-CSAIL-TR-2006-026.ps22.44Mbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record