Presentation is loading. Please wait.

Presentation is loading. Please wait.

Performance Analysis of the CONFIDANT Protocol

Similar presentations


Presentation on theme: "Performance Analysis of the CONFIDANT Protocol"— Presentation transcript:

1 Performance Analysis of the CONFIDANT Protocol
Ad Hoc Subgroup RIIT Security Lab Feb

2 Outline Background Related Work The CONFIDANT Protocol
Performance Analysis Future Work and Conclusion 2019/4/26

3 DSR 2019/4/26

4 Attacks No forwarding (of control messages or data)
Traffic deviation: unusual traffic attraction or the opposite Rout salvaging ,i.e., reporting to avoid a broken ling although no error has been observed. Lack of error messages Unusually frequent route updates Silent route change (Tampering) 2019/4/26

5 Related work Payment system Cryptography
Sequence numbers and digital signatures Duckling SAR Byzantine Detection, Reputation and Response Systems Watchdog and path rater TAODV 2019/4/26

6 The CONFIDANT Protocol Performance Analysis Future Work and Conclusion
Background Related Work The CONFIDANT Protocol Performance Analysis Future Work and Conclusion 2019/4/26

7 The Selfish Gene--Richard Dawkins
Sucker and Cheats Sucker Cheats Grudger Learn from observed behavior Learn from reported behavior 2019/4/26

8 2019/4/26

9 2019/4/26

10 Bayesian Estimation 2019/4/26

11 Bayesian Estimation 2019/4/26

12 Model Merging ∆ is the quantity of interest
Posterior distribution given data D Where 2019/4/26

13 Decision Making Combination Decision Making 2019/4/26

14 Decision Making 2019/4/26

15 Metrics Goodput Overhead Utility 2019/4/26

16 Outline Background Related Work The CONFIDANT Protocol
Performance Analysis Future Work and Conclusion 2019/4/26

17 2019/4/26

18 2019/4/26

19 2019/4/26

20 2019/4/26

21 2019/4/26

22 2019/4/26

23 2019/4/26

24 2019/4/26

25 2019/4/26

26 2019/4/26

27 Outline Background Related Work The CONFIDANT Protocol
Performance Analysis Future Work 2019/4/26

28 Future Work Transient removal and convergence Thresholds
Implementation to observable attacks Ensure the assumption of CONFIDANT—nodes are authenticated and no node can pretend to be another in order to get rid of a bad reputation Apply CONFIDANT to scalable mobile ad-hoc WANs 2019/4/26

29 Thank You


Download ppt "Performance Analysis of the CONFIDANT Protocol"

Similar presentations


Ads by Google