# Randomized Fault Tolerant Group Testing and Advanced Security

• My T. Thai
Chapter
Part of the SpringerBriefs in Optimization book series (BRIEFSOPTI)

## Abstract

In this chapter, we further optimize the time complexity of the scheme discussed in and provide more advanced solutions. In detail, a randomized fault-tolerant group testing construction to reduce the computational cost, compared to the one using irreducible polynomials on Galois Field is introduced. Based on such a new GT construction, a more robust defense solution to an advanced jamming attack is presented for various network scenarios. Theoretical analysis and simulation results are included to validate the performance of this framework.

## Keywords

Jamming Attacks Victim Node Jamming Signal Jam Area Trigger Node
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

## References

1. 1.
Du DZ, Hwang FK (2006) Pooling designs: group testing in molecular biology. World Scientific, SingaporeGoogle Scholar
2. 2.
Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Network 20:41–47Google Scholar
3. 3.
Dyachkov AG, Nabar S, Rykov VV, Rashad AM (1989) Superimposed distance codes. Prob Control Inf Theor 18(4):237–250Google Scholar
4. 4.
Sekar V, Duffield N, van der Merwe K, Spatscheck O, Zhang H (2006) LADS: Large-scale automated DDoS detection system. In: Proceedings of the annual conference on USENIX’06 annual technical conference, Boston, p 16Google Scholar
5. 5.
Xu W, Wood T, Trappe W, Zhang Y (2004) Channel surfing and spatial retreats: defenses against wireless denial of service. ACM workshop on wireless security, pp 80–89Google Scholar
6. 6.
Mingyan Li, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: Proceedings of the 26th IEEE international conference on computer communications (INFOCOM’07), pp 1307–1315Google Scholar
7. 7.
Khattab SM, Sangpachatanaruk C, Mosse D, Melhem R, Znati T (2004) Honeypots for mitigating service-level denial-of-service attacks. In: Proceedings of the 24th IEEE international conference on distributed computing systems (ICDCS’04), pp 328–337Google Scholar
8. 8.
Tague P, Nabar S, Ritcey JA, Poovendran R (2010) Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans Networking 19(1):184–194Google Scholar