Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks

被引:2
|
作者
Lin, Chu-Hsing [1 ]
Lai, Wei-Shen [2 ]
Huang, Yen-Lin [1 ]
Chou, Mei-Chun [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[2] Chien Kuo Technol Univ, Dept Informat Management, Changhua, Taiwan
关键词
D O I
10.1109/WAINA.2008.47
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secure on-demand ad hoc network routing protocol. After finishing the Route Discovery protocol, it just finds one route for the source and the destination nodes. However, the intermediate nodes can't use that route to transmitting data for themselves. For reducing the Route Discovery broadcast packets and reusing the valid route for increasing the packet delivery ratio, we present a new secure on-demand routing protocol based on ARIADNE, called I-ARIADNE. We design the authentication mechanism for the intermediate nodes to verify the route information and reuse it for another route discovery request. Such design can reduce the broadcast packets. Later, they can use that route for transmitting data to other nodes on it. From simulation results, by using our protocol the performance of the entire network environment will be enhanced.
引用
收藏
页码:1272 / +
页数:2
相关论文
共 50 条
  • [1] Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes
    Kargar, Mehdi
    Ghodsi, Mohammad
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 117 - 128
  • [2] A secure multicast routing protocol for ad hoc networks with misbehaving nodes
    Shim, YC
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 591 - 600
  • [3] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
  • [4] A secure routing protocol for mobile Ad hoc networks
    Li, Zhitang
    Shi, Shudong
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
  • [5] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [6] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [7] Secure routing and intrusion detection in ad hoc networks
    Patwardhan, A
    Parker, J
    Joshi, A
    Iorga, M
    Karygiannis, T
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 191 - 199
  • [8] SECURE ROUTING PROTOCOL DESIGN FOR UAV AD HOC NETWORKS
    Maxa, Jean Aime
    Ben Mahmoud, Mohamed Slim
    Larrieu, Nicolas
    [J]. 2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [9] Formal Analysis of Secure Routing Protocol for Ad Hoc Networks
    Niu, Qiuna
    [J]. 2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 171 - 174
  • [10] Secure routing protocol based trust for ad hoc networks
    Liu, Zhiyuan
    Lu, Shejie
    Yan, Jun
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 279 - +