Of Malicious Motes and Suspicious Sensors

How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. By broadcasting at the same time as Alice orBob, Collin can destroy their...

Full description

Bibliographic Details
Main Authors: Gilbert, Seth, Guerraoui, Rachid, Newport, Calvin
Other Authors: Nancy Lynch
Language:en_US
Published: 2006
Subjects:
Online Access:http://hdl.handle.net/1721.1/32534
_version_ 1811071285775564800
author Gilbert, Seth
Guerraoui, Rachid
Newport, Calvin
author2 Nancy Lynch
author_facet Nancy Lynch
Gilbert, Seth
Guerraoui, Rachid
Newport, Calvin
author_sort Gilbert, Seth
collection MIT
description How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. By broadcasting at the same time as Alice orBob, Collin can destroy their messages or overwhelm them with his ownmalicious data. Being a tiny device, however, Collin can onlybroadcast up to B times. Given that Alice and Bob do not knowB, and cannot distinguish honest from malicious messages, howlong can Collin prevent them from communicating? We show the answerto be 2B + Theta(lg|V|) communication rounds, where V is theset of values that Alice and Bob may transmit. We prove this resultto be optimal by deriving an algorithm that matches our lowerbound---even in the stronger case where Alice and Bob do not start thegame at the same time.We then argue that this specific 3-player game captures the generalextent to which a malicious adversary can disrupt coordination in asingle-hop wireless network. We support this claim by deriving---via reduction from the 3-player game---round complexity lower boundsfor several classical n-player problems: 2B + Theta(lg|V|) for reliable broadcast,2B + Omega(lg(n/k)) for leader election among k contenders,and 2B + Omega(k*lg(|V|/k)) for static k-selection. We then consider an extension of our adversary model that also includes up to t crash failures. We study binary consensus as the archetypal problem for this environment and show a bound of 2B + Theta(t) rounds. We conclude by providing tight, or nearly tight, upper bounds for all four problems. The new upper and lower bounds in this paper represent the first such results for a wireless network in which the adversary has the ability to disrupt communication.
first_indexed 2024-09-23T08:48:47Z
id mit-1721.1/32534
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T08:48:47Z
publishDate 2006
record_format dspace
spelling mit-1721.1/325342019-04-10T19:12:09Z Of Malicious Motes and Suspicious Sensors Gilbert, Seth Guerraoui, Rachid Newport, Calvin Nancy Lynch Theory of Computation wireless ad hoc networks byzantine reliable broadcast leader election k-selection consensus collision detection How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. By broadcasting at the same time as Alice orBob, Collin can destroy their messages or overwhelm them with his ownmalicious data. Being a tiny device, however, Collin can onlybroadcast up to B times. Given that Alice and Bob do not knowB, and cannot distinguish honest from malicious messages, howlong can Collin prevent them from communicating? We show the answerto be 2B + Theta(lg|V|) communication rounds, where V is theset of values that Alice and Bob may transmit. We prove this resultto be optimal by deriving an algorithm that matches our lowerbound---even in the stronger case where Alice and Bob do not start thegame at the same time.We then argue that this specific 3-player game captures the generalextent to which a malicious adversary can disrupt coordination in asingle-hop wireless network. We support this claim by deriving---via reduction from the 3-player game---round complexity lower boundsfor several classical n-player problems: 2B + Theta(lg|V|) for reliable broadcast,2B + Omega(lg(n/k)) for leader election among k contenders,and 2B + Omega(k*lg(|V|/k)) for static k-selection. We then consider an extension of our adversary model that also includes up to t crash failures. We study binary consensus as the archetypal problem for this environment and show a bound of 2B + Theta(t) rounds. We conclude by providing tight, or nearly tight, upper bounds for all four problems. The new upper and lower bounds in this paper represent the first such results for a wireless network in which the adversary has the ability to disrupt communication. 2006-04-19T17:01:59Z 2006-04-19T17:01:59Z 2006-04-19 MIT-CSAIL-TR-2006-026 http://hdl.handle.net/1721.1/32534 en_US Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory 20 p. 22447191 bytes 841434 bytes application/postscript application/pdf application/postscript application/pdf
spellingShingle wireless ad hoc networks
byzantine
reliable broadcast
leader election
k-selection
consensus
collision detection
Gilbert, Seth
Guerraoui, Rachid
Newport, Calvin
Of Malicious Motes and Suspicious Sensors
title Of Malicious Motes and Suspicious Sensors
title_full Of Malicious Motes and Suspicious Sensors
title_fullStr Of Malicious Motes and Suspicious Sensors
title_full_unstemmed Of Malicious Motes and Suspicious Sensors
title_short Of Malicious Motes and Suspicious Sensors
title_sort of malicious motes and suspicious sensors
topic wireless ad hoc networks
byzantine
reliable broadcast
leader election
k-selection
consensus
collision detection
url http://hdl.handle.net/1721.1/32534
work_keys_str_mv AT gilbertseth ofmaliciousmotesandsuspicioussensors
AT guerraouirachid ofmaliciousmotesandsuspicioussensors
AT newportcalvin ofmaliciousmotesandsuspicioussensors