Navigation in distance vector spaces and its use for node avoidance routing

Haim Zlatokrilov*, Hanoch Levy

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Traditional network routing uses the single (shortest) path paradigm. This paradigm exposes sessions to various attacks along this path, such as eavesdropping, DoS attacks etc. As a result, certain nodes or network regions may pose security threats and it is desired to consider node routing schemes which avoid them. The task of node avoidance routing is particularly challenging in distance-vector networks, where only shortest-distance information is available to the nodes. We address this problem by proposing a new routing paradigm in which the forwarding mechanism exploits the distance-vector information towards several nodes and utilizes it to forward network traffic on non-shortest paths routes; in particular on node-avoiding routes aiming at bypassing security-suspected nodes. We study this paradigm, propose a routing algorithm based on it and establish their properties. Extensive evaluation of the algorithm in general situations is conducted via simulation.

Original languageEnglish
Title of host publicationProceedings - IEEE INFOCOM 2007
Subtitle of host publication26th IEEE International Conference on Computer Communications
Pages1253-1261
Number of pages9
DOIs
StatePublished - 2007
EventIEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications - Anchorage, AK, United States
Duration: 6 May 200712 May 2007

Publication series

NameProceedings - IEEE INFOCOM
ISSN (Print)0743-166X

Conference

ConferenceIEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
Country/TerritoryUnited States
CityAnchorage, AK
Period6/05/0712/05/07

Keywords

  • Beacon
  • Distance vector
  • Multipath
  • Node avoidance
  • Routing
  • Virtual position

Fingerprint

Dive into the research topics of 'Navigation in distance vector spaces and its use for node avoidance routing'. Together they form a unique fingerprint.

Cite this