Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol
CNSR '07 Proceedings of the Fifth Annual Conference on Communication Networks and Services Research
Design and Performance Evaluation of Multipath Extensions for the DYMO Protocol
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
An Efficient Gateway Discovery in Ad Hoc Networks for Internet Connectivity
ICCIMA '07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) - Volume 04
Mobile ad hoc networking and the IETF
ACM SIGMOBILE Mobile Computing and Communications Review
Comparison of MANET routing protocols using a scaled indoor wireless grid
Mobile Networks and Applications
On Gateway Selection Protocol for DYMO-Based MANET
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
A survey of routing attacks in mobile ad hoc networks
IEEE Wireless Communications
Internet connectivity for mobile ad hoc networks: solutions and challenges
IEEE Communications Magazine
Authenticated routing for ad hoc networks
IEEE Journal on Selected Areas in Communications
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper, we propose a novel gateway (GW) selection protocol in hybrid Mobile Ad hoc Networks (MANETs). We focus on the situation that occurs when specialized, sensitive data is sent to the Internet from MANET nodes. These special data types are especially susceptible to security risks such as information leak and data falsification. Therefore, it is necessary for such special data to be forwarded by a secure/trusted GW which is controlled by a trusted network administrator. However, there should be multiple GWs deployed in a MANET, where the cost ineffectiveness makes it difficult for a network administrator to simultaneously manage every GW. Because of the risk of forwarding special data through an unmaintained GW, we propose a routing protocol which allows a source node to have sensitive data forwarded to the Internet through a trusted GW. To achieve this desirable performance, we improve upon one of the newest routing protocols, Dynamic MANET On-demand (DYMO), which works in consideration of application data. Through simulations, we evaluate our protocol in comparison with the conventional DYMO protocol. The results show that our protocol can make MANET source nodes choose GWs for specific data.