18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

tema <strong>de</strong> quórum para MANETs em até 87% diante <strong>de</strong> ataques <strong>de</strong> injeção <strong>de</strong> dados nas<br />

escritas. A <strong>de</strong>tecção <strong>de</strong> nós egoístas apresentou uma eficácia <strong>de</strong> 98,5% com uma taxa<br />

<strong>de</strong> falsos positivos menor que 2%, e a <strong>de</strong>tecção <strong>de</strong> nós maliciosos obteve uma eficácia <strong>de</strong><br />

80%, com uma taxa <strong>de</strong> falsos positivos inferior a 1%. Como trabalhos futuros, preten<strong>de</strong>-se<br />

testar o uso do QS 2 em outros cenários <strong>de</strong> MANETs, variando parâmetros como velocida<strong>de</strong>,<br />

quantida<strong>de</strong> <strong>de</strong> nós e quantida<strong>de</strong> <strong>de</strong> nós <strong>de</strong> má-conduta presente na re<strong>de</strong>.<br />

Referências<br />

Bellavista, P., Corradi, A., and Magistretti, E. (2005). Redman: An optimistic replication middleware for<br />

read-only resources in <strong>de</strong>nse manets. Pervasive Mobile Computing, 1:279–310.<br />

Derhab, A. and Badache, N. (2009). Data replication protocols for mobile ad-hoc networks: a survey and<br />

taxonomy. IEEE Communications Surveys and Tutorials, 11:33–51.<br />

Gramoli, V. and Raynal, M. (2007). Timed Quorum Systems for Large-Scale and Dynamic Environments,<br />

pages 429–442.<br />

Luo, J., Hubaux, J.-P., and Eugster, P. T. (2003). PAN: Providing reliable storage in mobile ad hoc networks<br />

with probabilistic quorum systems. In Proceedings of the 4th ACM International Symposium on Mobile<br />

Ad Hoc Networking and Computing (MobiHoc ’03), pages 1–12.<br />

Malkhi, D. and Reiter, M. (1997). Byzantine quorum systems. In Proceedings of the 29th Annual ACM<br />

Symposium on Theory of Computing (STOC ’97), pages 569–578.<br />

Malkhi, D., Reiter, M., Wool, A., and Wright, R. N. (1998). Probabilistic byzantine quorum systems. In<br />

Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, PODC<br />

’98, pages 321–322.<br />

Mannes, E., da Silva, E., and dos Santos, A. L. (2009). Analisando o <strong>de</strong>sempenho <strong>de</strong> um sistema <strong>de</strong><br />

quóruns probabilístico para manets diante <strong>de</strong> ataques maliciosos. In <strong>Anais</strong> do IX Simpósio Brasileiro em<br />

Segurança da Informação e <strong>de</strong> Sistemas Computacionais (SBSeg ’09), pages 71–84.<br />

Meisel, M., Pappas, V., and Zhang, L. (2010). A taxonomy of biologically inspired research in computer<br />

networking. Computer Networks, 54:901–916.<br />

Ng, W.-L. L. and Bassler, B. L. (2009). Bacterial quorum-sensing network architectures. Annual Review of<br />

Genetics, 43(1):197–222.<br />

Saito, Y. and Shapiro, M. (2005). Optimistic replication. ACM Computer Survey, 37:42–81.<br />

Salmon, H. M., Miceli, C., Pirmez, L., Rossetto, S., Rodrigues, P. H. A., Pirmez, R., Delicato, F. C.,<br />

and Carmo, L. F. (2010). Sistema <strong>de</strong> <strong>de</strong>tecção <strong>de</strong> intrusão imuno-inspirado customizado para re<strong>de</strong>s <strong>de</strong><br />

sensores sem fio. In Simpósio Brasileiro em Segurança da Informação e <strong>de</strong> Sistemas Computacionais<br />

(SBSeg ’10), pages 269–282.<br />

Tulone, D. (2007). Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems.<br />

Ad Hoc Networks, 5(8):1251–1271.<br />

Yang, H., Meng, X., and Lu, S. (2002). Self-organized network-layer security in mobile ad hoc networks.<br />

In Proceedings of the 1st ACM workshop on Wireless security (WiSE ’02), pages 11–20.<br />

Zhang, C., Song, Y., and Fang, Y. (2008). Mo<strong>de</strong>ling secure connectivity of self-organized wireless ad hoc<br />

networks. In Proceedings of the 27th Annual Joint Conference of the IEEE Computer and Communications<br />

Societies (INFOCOM ’08).<br />

Zhu, Z., Tan, Q., and Zhu, P. (2007). An effective secure routing for false data injection attack in wireless<br />

sensor network. In Managing Next Generation Networks and Services, volume 4773, pages 457–465.<br />

252

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!