Abstract
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threats. Flooding is a robust algorithm but, because of its extreme redundancy, it is impractical in dense networks. Indeed in large wireless networks, the use of flooding algorithms may lead to a broadcast storm in which the number of collisions is so large that we get system failure. Further reducing unnecessary transmissions greatly improves energy efficiency of such networks. Several variants have been proposed to reduce the relay overhead either deterministically or probabilistically. Gossip is a probabilistic algorithm, in which packet relaying is based on the outcome of coin tosses. The relay probability can be fixed, dynamic or adaptive. With dynamic Gossip, local information (local connectivity) is used. With adaptive Gossip, the decision to relay is adjusted adaptively based on the outcome of coin tosses, the local network structure and the local response to the flooding call. The goal of gossiping is to minimize the number of relays, while retaining the main benefits of flooding, i.e., effective distance.
In this paper we consider ways to reduce the number of redundant transmissions in broadcast flooding while guaranteeing security. We present several gossip type protocols, which exploit local connectivity and adaptively correct local relay failures. These use a (geodesic) cell based approach and preserve cell-distance. Our last two protocols are non probabilistic and guarantee delivery, the first such protocols to the best of our knowledge.
This material is based on work supported in part by the U.S. Army Research Laboratory and the U.S. Research Office under grant number DAAD19-02-1-0235.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe 2002) (September 2002)
Belding-Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine, 46–55 (April 1999)
Broch, J., et al.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proc. ACM MOBICOM, pp. 85–97 (1998)
Burmester, M., van Le, T.: Tracing Byzantine faults in ad hoc networks. In: Proceedings, Computer, Network and Information Security 2003, New York, December 10-12 (2003)
Burmester, M., van Le, T.: Secure Multipath Communication in Mobile Ad hoc Networks. In: International Conference on Information Technology, Coding and Computing, Las Vegas Nevada, April 5-7 (2004)
Burmester, M., Yasinsac, A.: Trust Infrastructures for Wireless, Mobile Networks. WSEAS Transactions on Telecommunications (January 2004)
Capkun, S., Hambdi, M., Hubaux, J.: Gps-free positioning in mobile ad hoc networks. In: Proceedings of Hawaii Int. Conf. on System Sciences (January 2001)
Cartigny, J., Simplot, D.: Border Node Retransmission Based Probabilistic Broadcast Protocols in Ad-Hoc Networks. In: Proc. 36th International Hawaii International Conference on System Sciences (HICSS 2003), Hawaii, USA (2003)
Corson, S., Macker, J.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC2501 (January 1999)
Haas, Z.J., Halpern, J.Y., Li, L.: Gossip-based ad hoc routing. In: Proc. of INFOCOM 2002, pp. 1707–1716 (2002)
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad-Hoc Wireless Networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, pp. 152–181. Kluwer Academic Publisher, Dordrecht (1996)
Karpijoki, V.: Signalling and Routing Security in Mobile Ad Hoc Networks. In: Proceedings of the Helsinki University of Technology, Seminar on Internetworking - Ad Hoc Networks (Spring 2000)
Karp, B., Kung, H.: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proceedings of the 6th International Conference on Mobile Computing and Networking, Boston, USA, pp. 243–254 (2000)
Ko, Y.B., Vaidya, N.H.: Location-Aided Routing in Mobile Ad Hoc Networks. In: Proceedings of ACM/IEEE MOBICOM 1998 (October 1998)
Ni, S.-Y., Tseng, Y.-C., Chen, Y.-S., Sheu, J.-P.: The broadcast storm problem in a mobile ad hoc network. In: Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 1999, pp. 151–162 (1999)
Okamoto, M.: Some inequalities relating to the partial sum of binomial probabilities. Annals of the Institute of Statistical Mathematics 10, 29–35 (1958)
Perkins, C.E., Royer, E.M., Das, S.R.: IP Flooding in ad hoc networks. Internet draft (draft-ietf-manet-bcast-00.txt) (November 2001) (Work in progress)
Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. In: IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90–100 (1999)
Royer, E., Toh, C.-K.: A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks. IEEE Personal Communications Magazine, 46–55 (April 1999)
Sasson, Y., Cavin, D., Schiper, A.: Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks. In: Proc. of IEEE WCNC 2003 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Burmester, M., Van Le, T., Yasinsac, A. (2004). Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2004. Lecture Notes in Computer Science, vol 3158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28634-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-28634-9_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22543-0
Online ISBN: 978-3-540-28634-9
eBook Packages: Springer Book Archive