Ad Hoc Wireless Networks: Architectures and Protocols
Ad Hoc Wireless Networks: Architectures and Protocols
Resisting Flooding Attacks in Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications
AUSWIRELESS '07 Proceedings of the The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Future trust management framework for mobile ad hoc networks
IEEE Communications Magazine
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Secure data communication in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their neighbors. Some others may act malicious by launching active security attacks like denial of service. This paper addresses few related works done on trust evaluation and establishment in ad hoc networks. Related works on flooding attack prevention are reviewed. A new trust approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate and prevent flooding attacks in an ad hoc environment. The performance of the trust algorithm is tested in an ad hoc network implementing the Dynamic Source Routing (DSR) protocol.