Download Now Free registration required
There have been numerous contributions to secure wireless networks, including key management, secure routing, Byzantine detection, and various protocol designs. The authors focus on Byzantine detection. The traditional approach is receiver-based - i.e. the receiver of the corrupted data detects the presence of an upstream adversary. However, this detection may come too late as the adversary is partially successful in disrupting the network (Even if it is detected). It has wasted network bandwidth, while the source is still unaware of the need for retransmission.
- Format: PDF
- Size: 279.5 KB