Deploying trust gateways to reinforce dynamic source routing

作者: A.A. Pirzada , C. McDonald

DOI: 10.1109/INDIN.2005.1560472

关键词:

摘要: A mobile ad-hoc network comprises of a number low power wireless nodes. Each these participating nodes endeavours to pass packets for other based upon preagreed protocol. The dynamic source routing (DSR) protocol is one the most commonly used protocols in networks. In DSR network, each transmitted data packet contains complete list node addresses that has traverse order reach its final destination. Intermediate blindly forward as per attached without taking into consideration behavioural pattern subsequent this paper, we present variant which intermediary act trust gateways. These gateways take account contemporary levels and thus facilitate detecting evading malicious With help extensive simulations, demonstrate proposed augments performance standard by up 30% where 40% maliciously. scheme also independent cryptographic mechanisms does not impose any superfluous conditions establishment operation phase.

参考文章(19)
Asad Amir Pirzada, Chris McDonald, Establishing trust in pure ad-hoc networks ad hoc networks. pp. 47- 54 ,(2004)
A.A. Pirzada, A. Datta, C. McDonald, Trust-based routing for ad-hoc wireless networks international conference on networks. ,vol. 1, pp. 326- 330 ,(2004) , 10.1109/ICON.2004.1409162
A. A. Pirzada, C. Mcdonald, Trust Establishment In Pure Ad-hoc Networks Wireless Personal Communications. ,vol. 37, pp. 139- 168 ,(2006) , 10.1007/S11277-006-1574-5
Yongguang Zhang, Wenke Lee, Intrusion detection in wireless ad-hoc networks acm/ieee international conference on mobile computing and networking. pp. 275- 283 ,(2000) , 10.1145/345910.345958
Yih-Chun Hu, Adrian Perrig, David B. Johnson, Ariadne: Proceedings of the 8th annual international conference on Mobile computing and networking - MobiCom '02. pp. 12- 23 ,(2002) , 10.1145/570645.570648
Frank Stajano, Ross Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks international workshop on security. pp. 172- 194 ,(1999) , 10.1007/10720107_24
Sonja Buchegger, Jean-Yves Le Boudec, Performance analysis of the CONFIDANT protocol Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '02. pp. 226- 236 ,(2002) , 10.1145/513800.513828
A.A. Pirzada, A. Datta, C. McDonald, Propagating trust in ad-hoc networks for reliable routing ad hoc networks. pp. 58- 62 ,(2004) , 10.1109/IWWAN.2004.1525541
Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker, Mitigating routing misbehavior in mobile ad hoc networks acm/ieee international conference on mobile computing and networking. pp. 255- 265 ,(2000) , 10.1145/345910.345955