Dependable Dynamic Source Routing without a trusted third party

作者: Asad Amir Pirzada , Chris McDonald , Amitava Datta

DOI:

关键词:

摘要: Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These formed with the help of their constituent wireless nodes, which expected forward packets for other nodes according a pre-agreed upon protocol. The Dynamic Source Routing (DSR) protocol is one such that helps create and maintain routes an ad-hoc network spite dynamic topology. accurate execution this requires sustained benevolent behaviour by all participating network. This may not always be observed, number known attacks against standard DSR can lead its incorrect execution, even failure. In paper, we present novel technique discovering maintaining dependable presence malicious nodes. With results from extensive simulations, highlight efficacy our scheme accentuate it outperforms when as many 40% acting maliciously.

参考文章(27)
Asad Amir Pirzada, Chris McDonald, Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks Multimedia Systems and Applications Series. pp. 57- 80 ,(2005) , 10.1007/0-387-22792-X_4
Asad Amir Pirzada, Chris McDonald, Secure Routing with the DSR Protocol The 3rd International Workshop on Wireless Information Systems. pp. 24- 33 ,(2004)
Asad Amir Pirzada, Chris McDonald, Kerberos assisted Authentication in Mobile Ad-hoc Networks ad hoc networks. pp. 41- 46 ,(2004)
Thomas Beth, Malte Borcherding, Birgit Klein, Valuation of Trust in Open Networks european symposium on research in computer security. pp. 3- 18 ,(1994) , 10.1007/3-540-58618-0_53
Brian J. Matt, David W. Carman, Peter S. Kruus, CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY ,(2000)
Asad Amir Pirzada, Chris McDonald, Establishing trust in pure ad-hoc networks ad hoc networks. pp. 47- 54 ,(2004)
A.A. Pirzada, A. Datta, C. McDonald, Trust-based routing for ad-hoc wireless networks international conference on networks. ,vol. 1, pp. 326- 330 ,(2004) , 10.1109/ICON.2004.1409162
Laura Marie Feeney, An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks Mobile Networks and Applications. ,vol. 6, pp. 239- 249 ,(2001) , 10.1023/A:1011474616255
A.A. Pirzada, C. McDonald, Deploying trust gateways to reinforce dynamic source routing international conference on industrial informatics. pp. 779- 784 ,(2005) , 10.1109/INDIN.2005.1560472
Dorothy E. Denning, A new paradigm for trusted systems new security paradigms workshop. pp. 36- 41 ,(1993) , 10.1145/283751.283772