A joint performance-vulnerability metric framework for designing ad hoc routing protocols

  • Andrew Clark
  • , Rommie Hardy
  • , Radha Poovendran

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

When a network is deployed in a hostile environment, different paths between nodes may provide varying levels of resilience to adversarial attack. Therefore, in order to ensure that network services are both timely and secure, both the vulnerability and performance of the path must be taken into account during route selection. However, current routing protocols do not take resilience of intermediate links into account, instead focusing on optimizing use of network resources. In this work, we propose a new class of resilience-enhanced routing protocols that incorporate the security of individual communication links when selecting a routing path. To enable resilient path selection, we introduce a joint performance-vulnerability metric, which quantifies the cost of a link based on both performance and vulnerability characteristics, so that shortest paths chosen using this metric will be both efficient and resilient to attack. We give an example that measures resilience to key exposure in ad hoc networks and demonstrate the feasibility of our scheme through analysis and simulation.

Original languageEnglish
Title of host publication2010 IEEE Military Communications Conference, MILCOM 2010
Pages930-935
Number of pages6
DOIs
StatePublished - 2010
Event2010 IEEE Military Communications Conference, MILCOM 2010 - San Jose, CA, United States
Duration: Oct 31 2010Nov 3 2010

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Conference

Conference2010 IEEE Military Communications Conference, MILCOM 2010
Country/TerritoryUnited States
CitySan Jose, CA
Period10/31/1011/3/10

Fingerprint

Dive into the research topics of 'A joint performance-vulnerability metric framework for designing ad hoc routing protocols'. Together they form a unique fingerprint.

Cite this