Selected Reading in Communications Theory
General Communications Theory And Secrecy Systems
Sensor Networks , Byzantine Adversaries , Ad Hoc Networks and Security
- 1. K. Sanzgiri, D. LaFlamme, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer,
Authenticated Routing for Ad Hoc Networks IEEE Journal on Selected Areas in Communications, Vol. 23, no. 3, March 2005, pp. 598-610.
- 2. J.-P. HuBaux, L. Buttyan, and S. Capkun, The quest for security in mobile ad hoc networks in Proc. MobiHoc, Oct. 2001, pp. 146-155.
- 3. L. Zhou and Z.J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, Nov.-Dec. 1999.
- 4. S. Yi, P. Naldurg, and R. Kravets, Security-aware ad hoc routing for wireless networks , in Proc. MobiHoc, Oct. 2001, pp. 299-302.
- 5. C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures in Proc. IEEE SNPA, May 2003, pp. 113-127.
- 6. B. Awerbusch, D. Holmer, and H. Rubens, Provably secure competitive routing against proactive byzantine adversaries via reinforcement learning , Johns Hopkins Univ., Baltimore, MD, Tech. Rep., May 2003.
- 7. A.D. wood and J.A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 2002, pp. 54-62.
- 8. M. Castro and B. Liskov, Pracitical Byzantine fault tolerance ," In Proc. of the 3rd USENIX Symposium on Operating System Design and Implementation (OSDI'99), pp. 173-186, New Orleans, 1999.
Rendezvous Technique & Event Based MiddleWare Architecture
- 1. Secure routing in wireless sensor networks: Attacks and countermeasures Distributed Mobility Control for Fault-Tolerant Mobile Networks Found in: 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05) By Jie Lin Publication Date: August 2005 pp. 61-66
- 2. Hermes: A Distributed Event-Based Middleware Architecture Found in: 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW '02) By Peter R. Pietzuch, Jean M. Bacon Publication Date: July 2002 pp. 611
- 3. Scalable QoS-Based Event Routing in Publish-Subscribe Systemsa Found in: Fourth IEEE International Symposium on Network Computing and Applications By Nuno Carvalho, Filipe Araujo, Luýs Rodrigues Publication Date: July 2005 pp. 101-108
- 4. Resilient Dissemination of Events in a Large-Scale Event Notification Service System Found in: 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) By Chit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh, Goutam Chakraborty Publication Date: March 2005 pp. 502-507
- 5. Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Networks Found in: 18th International Parallel and Distributed Processing Symposium (IPDPS'04) - Workshop 12 By Karim Seada, Ahmed Helmy Publication Date: April 2004
- 6. Todd, Terry & Bennett, Frasier Low power rendezvous in embedded wireless networks International Symposium on Mobile Ad Hoc Networking & Computing
- 7. Siegemund, Frank & Rohs, Nichael Rendezvous layer protocols for Bluetooh-enabled smart devices Pers Ubiquit Comput (2003)
Byzantine Behavior can be described as any behavior in an ad hoc or wireless network where one or more sensors or devices work in collusion to disrupt the network. This might include denial of service behavior, dropping or altering packets, topology distortion, impersonation, wormholes, and a host of other security challenges. In ad hoc wireless networks, there is very little topology control, no knowledge or trust of intermediate devices, and the nature of the transmission medium makes it especially susceptible to these types of Byzantine attacks.
A technique in ad-hoc and self orgnaizing networks where nodes are in a sleep state awaitng an appropriate beacon to awaken and interact with other sensors or bases stations. The default sleep mode of the sensor conserves power and resources. A typical interaction involves a service rendezvous between an active node and a node in sleep mode to initiate communication and start a session or application rendezvous. The BlueTooth standard describes the Inquiry state for devices wishing to discover othe devices in range and then Inquiry Scan state for devices that wish to be discovered by neighboring nodes.