Distributed Trust Based Routing in Mobile Ad-Hoc Networks

被引:4
作者
Jain, Shalabh [1 ]
Baras, John S. [1 ]
机构
[1] Univ Maryland, Syst Res Inst, Dept Elect & Comp Engn, College Pk, MD 20742 USA
来源
2013 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2013) | 2013年
基金
美国国家科学基金会;
关键词
ATTACK;
D O I
10.1109/MILCOM.2013.304
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Establishing trust and security in ad-hoc networks has been a long studied problem. Several methods have been proposed for evaluation and dissemination of trust in such networks, with the goal of providing secure data paths. In this paper, we propose a simple mechanism to utilize the point-to-point trust metrics derived from various methods for secure routing. The main advantage of our scheme is that it can be used in with existing on-demand routing protocols with minimal modification. Additionally, our scheme utilizes both link trust and the traditional node trust. We highlight scenarios that establish the need for associating trust with a link, rather than just a node. We validate via simulation, the security properties of our scheme in an ad-hoc network.
引用
收藏
页码:1801 / 1807
页数:7
相关论文
共 16 条
[1]  
[Anonymous], 1996, Mobile Computing
[2]  
Chiu H. S., 2006, 2006 1 INT S WIR PER
[3]   Ariadne: A secure on-demand routing protocol for ad hoc networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
WIRELESS NETWORKS, 2005, 11 (1-2) :21-38
[4]  
Jain Shalabh, 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC), P2712, DOI 10.1109/WCNC.2012.6214260
[5]  
Jain S, 2012, IEEE ICC, P6699, DOI 10.1109/ICC.2012.6364768
[6]  
Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
[7]   UNMASK: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks [J].
Khalil, Issa ;
Bagchi, Saurabh ;
Rotaru, Cristina N. ;
Shroff, Ness B. .
AD HOC NETWORKS, 2010, 8 (02) :148-164
[8]  
Marti S., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P255, DOI 10.1145/345910.345955
[9]   A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks [J].
Meghdadi, Majid ;
Ozdemir, Suat ;
Gueler, Inan .
IETE TECHNICAL REVIEW, 2011, 28 (02) :89-102
[10]   Ad-hoc On-Demand Distance Vector Routing [J].
Perkins, CE ;
Royer, EM .
WMCSA '99, SECOND IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 1999, :90-100