Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
PGP: Pretty Good Privacy
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
A secure routing protocol for ad hoc networks based on trust
ICNS '07 Proceedings of the Third International Conference on Networking and Services
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
A routing protocol based on trust for MANETs
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Hi-index | 0.00 |
Ad-hoc networks establish communication in improvised environments without requiring any fixed infrastructure. These networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. Therefore, it is required that the nodes cooperate for the integrity of network operation. However, nodes may refuse to cooperate by not forwarding packets to others for selfish reasons and/or not wanting to exhaust their resources. Due to high mobility of nodes in the network, detecting misbehavior is a complex problem. Nodes have to share routing information in order for each to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. This paper provides a survey of the work done in this field.