Show simple item record

dc.contributor.authorGilbert, Seth
dc.contributor.authorGuerraoui, Rachid
dc.contributor.authorNewport, Calvin Charles
dc.date.accessioned2015-03-31T17:44:45Z
dc.date.available2015-03-31T17:44:45Z
dc.date.issued2008-10
dc.identifier.issn03043975
dc.identifier.urihttp://hdl.handle.net/1721.1/96286
dc.description.abstractHow efficiently can a malicious device disrupt a single-hop wireless network? Imagine two honest players attempting to exchange information in the presence of a malicious adversary that can disrupt communication by jamming or overwriting messages. Assume the adversary has a broadcast budget of β—unknown to the honest players. We show that communication can be delayed for 2β+Θ(lg|V|) rounds, where V is the set of values that the honest players may transmit. We then derive, via reduction to this 3-player game, round complexity lower bounds for several classical nn-player problems: 2β+Ω(lg|V| for reliable broadcast, 2β+Ω(logn) for leader election, and 2β+Ω(klg|V| [over k]) for static k-selection. We also consider an extension of our adversary model that includes up to t crash failures. Here we show a bound of 2β+Θ(t) rounds for binary consensus. We provide tight, or nearly tight, upper bounds for all four problems. From these results we can derive bounds on the efficiency of malicious disruption, stated in terms of two new metrics: jamming gain (the ratio of rounds delayed to adversarial broadcasts) and disruption-free complexity (the rounds required to terminate in the special case of no disruption). Two key conclusions of this study: (1) all the problems considered feature semantic vulnerabilities that allow an adversary to disrupt termination more efficiently than simple jamming (i.e., all have a jamming gain greater than 1); and (2) for all the problems considered, the round complexity grows linearly with the number of bits to be communicated (i.e., all have a Ω(lg|V|) or Ω(lgn) disruption-free complexity.)en_US
dc.language.isoen_US
dc.publisherElsevieren_US
dc.relation.isversionofhttp://dx.doi.org/10.1016/j.tcs.2008.10.008en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceElsevieren_US
dc.titleOf malicious motes and suspicious sensorsen_US
dc.typeArticleen_US
dc.identifier.citationGilbert, Seth, Rachid Guerraoui, and Calvin Newport. “Of Malicious Motes and Suspicious Sensors.” Theoretical Computer Science 410, no. 6–7 (February 2009): 546–569. © 2008 Elsevier B.V.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.mitauthorNewport, Calvin Charlesen_US
dc.relation.journalTheoretical Computer Scienceen_US
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dspace.orderedauthorsGilbert, Seth; Guerraoui, Rachid; Newport, Calvinen_US
mit.licensePUBLISHER_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record