Survey on distributed detection mechanism for Byzantine attack in tree-based topology

Apeksha. B. Dhakde, Dr.Sonali Nimbhorkar(Ridhorkar)
{"title":"Survey on distributed detection mechanism for Byzantine attack in tree-based topology","authors":"Apeksha. B. Dhakde, Dr.Sonali Nimbhorkar(Ridhorkar)","doi":"10.1109/ICCPEIC.2014.6915338","DOIUrl":null,"url":null,"abstract":"In tree based topology each and every nodes are participating on communication with other nodes. So it is major challenge to secure the data transmission between the nodes in the network as many types of attacks are generated in between the communication. Byzantine attack is one of the most important security thread as it interrupt the communication of nodes in the network and behave like a innocent nodes while participating normally. In Byzantine attack compromisation of nodes takes place in that condition it is very difficult to detect the innocent and malicious nodes, with the byzantine nodes many other attacks are deployed as Blackhole attack, wormhole attack, gray-hole attack, flood rushing attack, sinkhole attack etc. Routing protocols helps to provide the way through which the nodes can be able to communicate with each other. Also provide the cost associated with each node so as to differentiate investment of resources from each node as communication takes place. For securing the data transmission in a network algorithms proposed which will bound the faulty data transmission and also limits the resources usage by decreasing the investment of resources which takes part in communication. Performance will be measures in terms of parameter as packet delivery fraction, energy consumption, and End-to-end delays.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPEIC.2014.6915338","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In tree based topology each and every nodes are participating on communication with other nodes. So it is major challenge to secure the data transmission between the nodes in the network as many types of attacks are generated in between the communication. Byzantine attack is one of the most important security thread as it interrupt the communication of nodes in the network and behave like a innocent nodes while participating normally. In Byzantine attack compromisation of nodes takes place in that condition it is very difficult to detect the innocent and malicious nodes, with the byzantine nodes many other attacks are deployed as Blackhole attack, wormhole attack, gray-hole attack, flood rushing attack, sinkhole attack etc. Routing protocols helps to provide the way through which the nodes can be able to communicate with each other. Also provide the cost associated with each node so as to differentiate investment of resources from each node as communication takes place. For securing the data transmission in a network algorithms proposed which will bound the faulty data transmission and also limits the resources usage by decreasing the investment of resources which takes part in communication. Performance will be measures in terms of parameter as packet delivery fraction, energy consumption, and End-to-end delays.
基于树的拜占庭攻击分布式检测机制研究
在基于树的拓扑结构中,每个节点都参与与其他节点的通信。因此,网络中节点之间的数据传输安全是一个重大挑战,因为节点之间的通信会产生多种类型的攻击。拜占庭攻击是最重要的安全线程之一,它中断网络中节点的通信,在正常参与的情况下表现得像一个无辜的节点。在拜占庭攻击中,节点的妥协发生在这种情况下,很难检测到无辜和恶意的节点,拜占庭节点部署了许多其他攻击,如黑洞攻击,虫洞攻击,灰洞攻击,洪水攻击,天坑攻击等。路由协议有助于提供节点之间相互通信的方式。还提供与每个节点相关的成本,以便在通信发生时区分每个节点的资源投资。为了保证网络中数据传输的安全,提出了一种算法,该算法既可以约束错误的数据传输,又可以通过减少参与通信的资源投入来限制资源的使用。性能将根据诸如数据包传送率、能耗和端到端延迟等参数来衡量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信