Authenticated routing for ad hoc networks protocol and misbehaving nodes

  • Authors:
  • Abdalla Mahmoud;Ahmed Sameh;Sherif El Kassas

  • Affiliations:
  • Department of Computer Science, The American University in Cairo, Egypt;Department of Computer Science, The American University in Cairo, Egypt;Department of Computer Science, The American University in Cairo, Egypt

  • Venue:
  • TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail how ARAN works, criticize how an authenticated misbehaving node can abuse the bandwidth and propose different solutions for this flaw in the protocol.