Anais - Engenharia de Redes de Comunicação - UnB
Anais - Engenharia de Redes de Comunicação - UnB
Anais - Engenharia de Redes de Comunicação - UnB
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
tema <strong>de</strong> quórum para MANETs em até 87% diante <strong>de</strong> ataques <strong>de</strong> injeção <strong>de</strong> dados nas<br />
escritas. A <strong>de</strong>tecção <strong>de</strong> nós egoístas apresentou uma eficácia <strong>de</strong> 98,5% com uma taxa<br />
<strong>de</strong> falsos positivos menor que 2%, e a <strong>de</strong>tecção <strong>de</strong> nós maliciosos obteve uma eficácia <strong>de</strong><br />
80%, com uma taxa <strong>de</strong> falsos positivos inferior a 1%. Como trabalhos futuros, preten<strong>de</strong>-se<br />
testar o uso do QS 2 em outros cenários <strong>de</strong> MANETs, variando parâmetros como velocida<strong>de</strong>,<br />
quantida<strong>de</strong> <strong>de</strong> nós e quantida<strong>de</strong> <strong>de</strong> nós <strong>de</strong> má-conduta presente na re<strong>de</strong>.<br />
Referências<br />
Bellavista, P., Corradi, A., and Magistretti, E. (2005). Redman: An optimistic replication middleware for<br />
read-only resources in <strong>de</strong>nse manets. Pervasive Mobile Computing, 1:279–310.<br />
Derhab, A. and Badache, N. (2009). Data replication protocols for mobile ad-hoc networks: a survey and<br />
taxonomy. IEEE Communications Surveys and Tutorials, 11:33–51.<br />
Gramoli, V. and Raynal, M. (2007). Timed Quorum Systems for Large-Scale and Dynamic Environments,<br />
pages 429–442.<br />
Luo, J., Hubaux, J.-P., and Eugster, P. T. (2003). PAN: Providing reliable storage in mobile ad hoc networks<br />
with probabilistic quorum systems. In Proceedings of the 4th ACM International Symposium on Mobile<br />
Ad Hoc Networking and Computing (MobiHoc ’03), pages 1–12.<br />
Malkhi, D. and Reiter, M. (1997). Byzantine quorum systems. In Proceedings of the 29th Annual ACM<br />
Symposium on Theory of Computing (STOC ’97), pages 569–578.<br />
Malkhi, D., Reiter, M., Wool, A., and Wright, R. N. (1998). Probabilistic byzantine quorum systems. In<br />
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, PODC<br />
’98, pages 321–322.<br />
Mannes, E., da Silva, E., and dos Santos, A. L. (2009). Analisando o <strong>de</strong>sempenho <strong>de</strong> um sistema <strong>de</strong><br />
quóruns probabilístico para manets diante <strong>de</strong> ataques maliciosos. In <strong>Anais</strong> do IX Simpósio Brasileiro em<br />
Segurança da Informação e <strong>de</strong> Sistemas Computacionais (SBSeg ’09), pages 71–84.<br />
Meisel, M., Pappas, V., and Zhang, L. (2010). A taxonomy of biologically inspired research in computer<br />
networking. Computer Networks, 54:901–916.<br />
Ng, W.-L. L. and Bassler, B. L. (2009). Bacterial quorum-sensing network architectures. Annual Review of<br />
Genetics, 43(1):197–222.<br />
Saito, Y. and Shapiro, M. (2005). Optimistic replication. ACM Computer Survey, 37:42–81.<br />
Salmon, H. M., Miceli, C., Pirmez, L., Rossetto, S., Rodrigues, P. H. A., Pirmez, R., Delicato, F. C.,<br />
and Carmo, L. F. (2010). Sistema <strong>de</strong> <strong>de</strong>tecção <strong>de</strong> intrusão imuno-inspirado customizado para re<strong>de</strong>s <strong>de</strong><br />
sensores sem fio. In Simpósio Brasileiro em Segurança da Informação e <strong>de</strong> Sistemas Computacionais<br />
(SBSeg ’10), pages 269–282.<br />
Tulone, D. (2007). Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems.<br />
Ad Hoc Networks, 5(8):1251–1271.<br />
Yang, H., Meng, X., and Lu, S. (2002). Self-organized network-layer security in mobile ad hoc networks.<br />
In Proceedings of the 1st ACM workshop on Wireless security (WiSE ’02), pages 11–20.<br />
Zhang, C., Song, Y., and Fang, Y. (2008). Mo<strong>de</strong>ling secure connectivity of self-organized wireless ad hoc<br />
networks. In Proceedings of the 27th Annual Joint Conference of the IEEE Computer and Communications<br />
Societies (INFOCOM ’08).<br />
Zhu, Z., Tan, Q., and Zhu, P. (2007). An effective secure routing for false data injection attack in wireless<br />
sensor network. In Managing Next Generation Networks and Services, volume 4773, pages 457–465.<br />
252