David Wei

Jacob Mathai

Selected Reading in Communications Theory

General Communications Theory And Secrecy Systems

Sensor Networks , Byzantine Adversaries , Ad Hoc Networks and Security

Rendezvous Technique & Event Based MiddleWare Architecture


Byzantine Behavior

Byzantine Behavior can be described as any behavior in an ad hoc or wireless network where one or more sensors or devices work in collusion to disrupt the network. This might include denial of service behavior, dropping or altering packets, topology distortion, impersonation, wormholes, and a host of other security challenges. In ad hoc wireless networks, there is very little topology control, no knowledge or trust of intermediate devices, and the nature of the transmission medium makes it especially susceptible to these types of Byzantine attacks.

Rendezvous Technique

A technique in ad-hoc and self orgnaizing networks where nodes are in a sleep state awaitng an appropriate beacon to awaken and interact with other sensors or bases stations. The default sleep mode of the sensor conserves power and resources. A typical interaction involves a service rendezvous between an active node and a node in sleep mode to initiate communication and start a session or application rendezvous. The BlueTooth standard describes the Inquiry state for devices wishing to discover othe devices in range and then Inquiry Scan state for devices that wish to be discovered by neighboring nodes.