NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Caching strategies in on-demand routing protocols for wireless ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks
Mobile Networks and Applications
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ipsec: Securing Vpns
PGP: Pretty Good Privacy
A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
KMN '02 Proceedings of the IEEE Workshop on Knowledge Media Networking
Kerberos assisted Authentication in Mobile Ad-hoc Networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Prevention of flooding attacks in mobile ad hoc networks
Proceedings of the International Conference on Advances in Computing, Communication and Control
Small-world network inspired trustworthy web service evaluation and management model
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Journal of Network and Computer Applications
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
Trust models and applications in communication and multi-agent systems
International Journal of Knowledge-based and Intelligent Engineering Systems - Selected papers of KES2012-Part 2 of 2
Hi-index | 0.24 |
An ad-hoc network is formed when two or more wireless nodes agree to forward packets on behalf of each other. As the wireless range of such nodes is severely limited, the nodes mutually cooperate with their neighbours in order to extend the overall communication range of the network. Dynamic Source Routing (DSR) is one of the commonly used protocols used in establishing ad-hoc networks. The network keeps on functioning smoothly when each node executes the routing protocol in the correct manner. However, along with benevolent nodes, there may always be some malicious and selfish nodes present in the network that try to disrupt, distort or disturb the network traffic. In this paper, we propose a novel and pragmatic scheme for establishing and sustaining trustworthy routes in the network. Each node maintains trust levels for its immediate neighbours based upon their current actions. Nodes also share these trust levels (reputations) to get ancillary information about other nodes in the network. In order to minimise control packet overhead, we have integrated the trust sharing mechanism with the DSR route discovery process in a unique manner that augments the protocol's performance in the presence of malicious nodes.