File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

최영리

Choi, Young-Ri
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 480 -
dc.citation.number 6-7 -
dc.citation.startPage 467 -
dc.citation.title THEORETICAL COMPUTER SCIENCE -
dc.citation.volume 410 -
dc.contributor.author Bazzi, Rida A. -
dc.contributor.author Choi, Young-Ri -
dc.contributor.author Gouda, Mohamed G. -
dc.date.accessioned 2023-12-22T08:09:51Z -
dc.date.available 2023-12-22T08:09:51Z -
dc.date.created 2014-10-30 -
dc.date.issued 2009-02 -
dc.description.abstract We present a secure routing protocol that is immune to Sybil attacks and that can tolerate collusion of Byzantine routers. It can tolerate either initial collusion of Byzantine routers or runtime collusion of non-adjacent Byzantine routers, both in the absence of runtime collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also simultaneously tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, it guarantees a bound on the difference between the calculated distance and the actual shortest distance. The bound depends on the number of Byzantine routers on a path. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes. -
dc.identifier.bibliographicCitation THEORETICAL COMPUTER SCIENCE, v.410, no.6-7, pp.467 - 480 -
dc.identifier.doi 10.1016/j.tcs.2008.10.004 -
dc.identifier.issn 0304-3975 -
dc.identifier.scopusid 2-s2.0-58549107568 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/8072 -
dc.identifier.url http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=58549107568 -
dc.identifier.wosid 000263635200003 -
dc.language 영어 -
dc.publisher ELSEVIER SCIENCE BV -
dc.title Hop chains: Secure routing and the establishment of distinct identities -
dc.type Article -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Computer networks -
dc.subject.keywordAuthor Sybil attack -
dc.subject.keywordAuthor Routing -
dc.subject.keywordAuthor Security -
dc.subject.keywordAuthor Byzantine -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.