A secure routing protocol for MWNs based on cross-layer dynamic reputation mechanism

被引:0
作者
机构
[1] Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou
[2] Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an
来源
Lin, Hui | 1600年 / Science Press卷 / 51期
关键词
Cross layer design; Multi-hop wireless networks; Network security; Reputation mechanism; Routing protocol;
D O I
10.7544/issn1000-1239.2014.20131460
中图分类号
学科分类号
摘要
Multi-hop wireless networks (MWNs) face various attacks threats, especially the internal multi-layer attacks and bad mouthing attack aiming to the routing security. As an effective method to evaluate the trust relationship between the nodes and against internal attacks, reputation mechanisms have been introduced into MWNs to preserve the routing security. Although there are a multitude of research work, most of them are based on the layered design and only considering the single layer attacks, thus ignoring the multi-layer attacks. And they also ignore the bad mouthing attack and the creditability of the recommended nodes and recommended information, which reduces the reliability of the reputation evaluation results. To solve the above problem, this paper first proposes a new reliable recommendation based cross layer dynamic reputation mechanism named CRM, and then proposes a secure routing protocol RPCSR based on the CRM. Simulation results and performance analysis demonstrate that the proposed secure routing protocol RPCSR can implement routing security preserving against the internal multi-layer attacks and bad mouthing attack effectively.
引用
收藏
页码:1486 / 1496
页数:10
相关论文
共 25 条
  • [1] Han B., Li J., Su J., Et al., Self-Supported cooperative networking for emergency services in multi-hop wireless networks, IEEE Journal on Selected Areas in Communications, 30, 2, pp. 450-457, (2012)
  • [2] Zhang C., Improving the performance and security of multi-hop wireless networks, (2011)
  • [3] Sen J., Security and Privacy Issues in Wireless Mesh Networks: A Survey, pp. 189-272, (2013)
  • [4] Ben-Othman J., Claude J.P., Benitez Y.I.S., A novel mechanism to secure internal attacks in HWMP routing protocol, pp. 162-166, (2012)
  • [5] Khan S., Alrajeh N.A., Loo K.K., Secure route selection in wireless mesh networks, Computer Networks, 56, 2, pp. 491-503, (2012)
  • [6] Hamid S.A., Hassanein H.S., Takahara G., Routing for Wireless Multi-Hop Networks: Distinguishing Features, pp. 25-66, (2013)
  • [7] Li X., Li H., Yang K., Et al., A secure routing protocol based on D-S evidence theory in ad hoc networks, Journal of Computer Research and Development, 48, 8, pp. 1406-1413, (2011)
  • [8] Wu Y., Li J., Lin C., Survey of ssecurity and trust in opportunistic networks, Journal of Computer Research and Development, 50, 2, pp. 278-290, (2013)
  • [9] Paris S., Rotaru C.N., Martignon F., Et al., EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants, pp. 576-580, (2011)
  • [10] Khan S., Loo J., Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks, Wireless Personal Communications, 62, 1, pp. 201-214, (2012)