A Quantitative Study of Accountability in Wireless Multi-hop Networks

In this paper, we explore a quantitative approach to accountable wireless multi-hop networks. We propose using hierarchical P-Accountability to adapt the requirements of modeling a complex network environment and assess the degree of accountability in a fine-grained manner. We have defined P-Accountability and demonstrated its use in the hierarchical network environment. In addition, we apply P-Accountability to a wireless multi-hop network system. Both numerical and simulation results show that our approach is applicable to most accountable systems and that it provides a flexible and comprehensive view of the degree of accountability.

[1]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[2]  Ruth Breu,et al.  Quantitative Assessment of Enterprise Security System , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[3]  P. Reiher,et al.  Building accountability into the future Internet , 2008, 2008 4th Workshop on Secure Network Protocols.

[4]  Stefan Savage,et al.  Proceedings of the ACM SIGCOMM 2008 conference on Data communication , 2008, SIGCOMM 2008.

[5]  Jennifer Rexford,et al.  Accountability in hosted virtual networks , 2009, VISA '09.

[6]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[7]  Vern Paxson End-to-end internet packet dynamics , 1999, TNET.

[8]  Svein J. Knapskog,et al.  A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[9]  Jeffrey S. Chase,et al.  Strong accountability for network storage , 2007, TOS.

[10]  Yang Xiao,et al.  PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks , 2010, ISA.

[11]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[12]  Jeffrey S. Chase,et al.  Trust but verify: accountability for network services , 2004, EW 11.

[13]  Sudhir Aggarwal,et al.  Incorporating accountability into internet email , 2009, SAC '09.

[14]  Jeffrey S. Chase,et al.  The role of accountability in dependable distributed systems , 2005 .

[15]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[16]  Nick Feamster,et al.  Holding the Internet Accountable , 2007, HotNets.

[17]  Nick Feamster,et al.  Accountable internet protocol (aip) , 2008, SIGCOMM '08.

[18]  Andreas Haeberlen,et al.  PeerReview: practical accountability for distributed systems , 2007, SOSP.

[19]  Vern Paxson,et al.  End-to-end Internet packet dynamics , 1997, SIGCOMM '97.

[20]  P. S. Tasker,et al.  DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .

[21]  Toby Moncaster,et al.  Re-ECN: Adding Accountability for Causing Congestion to TCP/IP , 2010 .

[22]  Yang Xiao,et al.  P-Accountable Networked Systems , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[23]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[24]  Katerina J. Argyraki,et al.  Loss and Delay Accountability for the Internet , 2007, 2007 IEEE International Conference on Network Protocols.

[25]  Andreas Haeberlen,et al.  CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable , 2009, NDSS.