Analytical models for trust based routing protocols in wireless ad hoc networks

作者: Deepika Kukreja , Umang Singh , B. V.R. Reddy

DOI: 10.1145/2237796.2237805

关键词: Distributed computingAdaptive quality of service multi-hop routingComputer networkOptimized Link State Routing ProtocolAd hoc wireless distribution serviceComputer scienceLink-state routing protocolZone Routing ProtocolDestination-Sequenced Distance Vector routingDynamic Source RoutingWireless Routing Protocol

摘要: In Wireless Ad Hoc Network environment, there are three ways to understand a routing protocol: (i) monitoring, (ii) simulation and (iii) modeling. this paper, the different trust based secure protocols used in wireless ad hoc networks analyzed, modeled described by incorporating process flow diagrams. These diagrams represent stepwise work activities actions. It shows overall of control process, program or protocol. This paper focuses on security aspects parameter into account also highlights methodology protocols. Such have been categorized model for enforcing security, information making effective decisions. we model, discuss analyze schemes which do not require each network node promiscuous mode. We propose design new protocol - Trust Routing using Dominating Set Approach (TRDSA) overcomes shortcomings existing

参考文章(43)
A.A. Pirzada, A. Datta, C. McDonald, Propagating trust in ad-hoc networks for reliable routing ad hoc networks. pp. 58- 62 ,(2004) , 10.1109/IWWAN.2004.1525541
Manel Guerrero Zapata, N. Asokan, Securing ad hoc routing protocols Proceedings of the ACM workshop on Wireless security - WiSE '02. pp. 1- 10 ,(2002) , 10.1145/570681.570682
Charles E. Perkins, Pravin Bhagwat, Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers acm special interest group on data communication. ,vol. 24, pp. 234- 244 ,(1994) , 10.1145/190314.190336
Sanjay K. Dhurandher, Vijeta Mehra, Multi-path and Message Trust-Based Secure Routing in Ad Hoc Networks international conference on advances in computing, control, and telecommunication technologies. pp. 189- 194 ,(2009) , 10.1109/ACT.2009.55
Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks acm/ieee international conference on mobile computing and networking. pp. 255- 265 ,(2000) , 10.1145/345910.345955
Xiaoqi Li, M.R. Lyu, Jiangchuan Liu, A trust model based routing protocol for secure ad hoc networks ieee aerospace conference. ,vol. 2, pp. 1286- 1295 ,(2004) , 10.1109/AERO.2004.1367726
Yih-Chun Hu, D.B. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks workshop on mobile computing systems and applications. pp. 3- 13 ,(2002) , 10.1109/MCSA.2002.1017480
Zhongwei Zhang, An intelligent scheme of secure routing for mobile Ad Hoc networks international conference on signal processing and communication systems. pp. 1- 6 ,(2008) , 10.1109/ICSPCS.2008.4813739
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M Belding-Royer, A secure routing protocol for ad hoc networks international conference on network protocols. pp. 78- 89 ,(2002) , 10.1109/ICNP.2002.1181388
Sanjay K. Dhurandher, Mohammad S. Obaidat, Karan Verma, Pushkar Gupta, Pravina Dhurandher, FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems IEEE Systems Journal. ,vol. 5, pp. 176- 188 ,(2011) , 10.1109/JSYST.2010.2095910