A new paradigm for trusted systems
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Secure Pervasive Computing without a Trusted Third Party
ICPS '04 Proceedings of the The IEEE/ACS International Conference on Pervasive Services
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Simulation and comparison of communication protocols in ad hoc network
EHAC'08 Proceedings of the 7th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Mitigation of the effects of selfish and malicious nodes in ad-hoc networks
WSEAS Transactions on Computers
Enhancing DSR protocol performance in mobile ad hoc network using ACK reply
WSEAS TRANSACTIONS on COMMUNICATIONS
Comparative study of demand driven routing protocols over mobile ad-hoc networks
ICCOM Proceedings of the 13th WSEAS international conference on Communications
Hi-index | 0.00 |
Wireless sensor networks have drawn a lot of attention recently due to their broad applications in both military and civilian operations. Sensor nodes in the network are characterized by severely constrained energy resources and communicational capabilities. Since, these nodes are frequently established in a physically insecure environment, they are vulnerable to different types of active attacks. These attacks can inject malicious packets by compromising the node. Routing protocols are common target of these compromised nodes. Secured reactive routing protocols have recently been developed by using cryptographic algorithms against these attacks. However these routing protocols entail a number of prerequisites during both network establishment and operation phases. In contrast, trust based routing protocols locate trusted routes rather secure routes in the network. In this paper, a secure routing protocol named secured dynamic source routing protocol (S-DSR) is implemented for mobile sensor networks by incorporating trust based mechanism in the existing dynamic source routing protocol (DSR). Simulation results prove that S-DSR outperforms the DSR by reducing the routing overhead and improving the delivery ratio of the network.