Data networks (2nd ed.)
The Ad Hoc on-demand distance-vector protocol
Ad hoc networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
A high-throughput path metric for multi-hop wireless routing
Proceedings of the 9th annual international conference on Mobile computing and networking
IEEE Transactions on Computers
Computer Networks: A Systems Approach, 3rd Edition
Computer Networks: A Systems Approach, 3rd Edition
An efficient quality of service routing algorithm for delay-sensitive applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Ad hoc network routing and security: A review: Research Articles
International Journal of Communication Systems
Distributed algorithms for secure multipath routing in attack-resistant networks
IEEE/ACM Transactions on Networking (TON)
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
Routing with Byzantine robustness
Routing with Byzantine robustness
Scalable and deterministic key agreement for large scale networks
IEEE Transactions on Wireless Communications
Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
A formal study of trust-based routing in wireless ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Journal of Network and Computer Applications
Hi-index | 0.01 |
Due to the fact that the wireless links in an ad hoc network are susceptible to attacks and the nodal mobility renders the network to have a highly dynamic topology, it becomes critical to detect major attacks against the routing protocols of such networks and also provide some extent of QoS to the network traffic. In this paper, we present a new secure routing protocol (SRP) with quality of service (QoS) support, called Trustworthiness-based Quality Of Service (TQOS) routing, which includes secure route discovery, secure route setup, and trustworthiness-based QoS routing metrics. The routing control messages are secured by using both public and shared keys, which can be generated on-demand and maintained dynamically. The message exchanging mechanism also provides a way to detect attacks against routing protocols, particularly the most difficult internal attacks. The routing metrics are obtained by combing the requirements on the trustworthiness of the nodes in the network and the QoS of the links along a route. The simulation results have demonstrated the effectiveness of the proposed secure QoS routing protocol in both security and performance.