COSR: A Reputation-Based Secure Route Protocol in MANET

被引:4
|
作者
Wang, Fei [1 ]
Wang, Furong [1 ]
Huang, Benxiong [1 ]
Yang, Laurence T. [2 ]
机构
[1] Huazhong Univ Sci & Technol HUST, Elect & Informat Engn Dept, Wuhan 430074, Peoples R China
[2] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS, Canada
关键词
Information System; System Application; Full Article; Common Assumption; Secure Problem;
D O I
10.1155/2010/258935
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Now, the route protocols defined in the Mobile Ad Hoc Network (MANET) are constructed in a common assumption which all nodes contained in such networks are trustworthy and cooperative. Once malicious or selfish nodes exist, all route paths built by these protocols must be broken immediately. According to the secure problems within MANET, this paper proposes Cooperative On-demand Secure Route (COSR), a novel secure source route protocol, against malicious and selfish behaviors. COSR measures node reputation (NR) and route reputation (RR) by contribution, Capability of Forwarding (CoF) and recommendation upon Dynamic Source Route (DSR) and uses RR to balance load to avoid hotpoint. Furthermore, COSR defines path collection algorithm by NR to enhance efficiency of protocol. At last, we verify COSR through GloMoSim. Results show that COSR is secure and stable.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] COSR: A Reputation-Based Secure Route Protocol in MANET
    Fei Wang
    Furong Wang
    Benxiong Huang
    LaurenceT Yang
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [2] COSR: Cooperative on-demand secure route protocol in MANET
    Wang, Fei
    Mo, Yijun
    Huang, Benxiong
    2006 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES,VOLS 1-3, 2006, : 75 - +
  • [3] Secure Dominating Set-Based Routing Protocol in MANET: Using Reputation
    Mohajer, Amin
    Bavaghar, Maryam
    Saboor, Rashin
    Payandeh, Ali
    2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [4] Reputation-Based Opportunistic Routing Protocol Using Q-Learning for MANET Attacked by Malicious Nodes
    Ryu, Joonsu
    Kim, Sungwook
    IEEE ACCESS, 2023, 11 : 47701 - 47711
  • [5] Reputation-Based Federated Learning for Secure Wireless Networks
    Song, Zhendong
    Sun, Hongguang
    Yang, Howard H.
    Wang, Xijun
    Zhang, Yan
    Quek, Tony Q. S.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) : 1212 - 1226
  • [6] Dynamics of a localized reputation-based network protocol
    Karakostas, George
    Kharaud, Raminder
    Viglas, Anastasios
    2013 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2013, : 147 - 152
  • [7] Secure Reputation-Based Authentication With Malicious Detection in VANETs
    Yang, Xu
    Zhu, Fei
    Yang, Xuechao
    Luo, Junwei
    Yi, Xun
    Ning, Jianting
    Huang, Xinyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 359 - 372
  • [8] Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol
    Ourouss, Kaoutar
    Naja, Najib
    Jamali, Abdellah
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (01) : 207 - 226
  • [9] Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol
    Kaoutar Ourouss
    Najib Naja
    Abdellah Jamali
    Wireless Personal Communications, 2021, 116 : 207 - 226
  • [10] SR3: secure resilient reputation-based routing
    Altisen, Karine
    Devismes, Stephane
    Jamet, Raphael
    Lafourcade, Pascal
    WIRELESS NETWORKS, 2017, 23 (07) : 2111 - 2133