GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
A trust degree based access control in grid environments
Information Sciences: an International Journal
On asymptotically optimal routing in large wireless networks and Geometrical Optics analogy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Incentive-based control of ad hoc networks: A performance study
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the detection of signaling DoS attacks on 3G/WiMax wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
A trustworthiness-based QoS routing protocol for wireless ad hoc networks
IEEE Transactions on Wireless Communications
Correlated link shadow fading in multi-hop wireless networks
IEEE Transactions on Wireless Communications
AODV-RIP: improved security in mobile ad hoc networks through route investigation procedure
Concurrency and Computation: Practice & Experience
Using TPMs to secure vehicular ad-hoc networks (VANETs)
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Future trust management framework for mobile ad hoc networks
IEEE Communications Magazine
Attack-resistant cooperation stimulation in autonomous ad hoc networks
IEEE Journal on Selected Areas in Communications
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
A weight-value algorithm for finding connected dominating sets in a MANET
Journal of Network and Computer Applications
Link stability estimation based on link connectivity changes in mobile ad-hoc networks
Journal of Network and Computer Applications
Hi-index | 0.00 |
In a mobile ad hoc network (MANET), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Unlike most previous studies that sought only the shortest path, our study proposes a novel trusted route that considers communication reliability and path length for a reliable and feasible packet delivery in a MANET. In most MANET routing schemes, security is an added layer above the routing layer. We introduce the concept of attribute similarity in finding potentially friendly nodes among strangers; so security is inherently integrated into the routing protocol where nodes evaluate trust levels of others based on a set of attributes. Unlike the fixed probability of dropping packets adopted in other routing mechanisms, our new forwarding rule is designed based on the attribute similarity and provides a recommended method in calculating the degree of similarity between attributes. The simulations show that the proposed routing scheme behaves better than the Dynamic Source Routing (DSR) protocol in warding off blackhole and changing behavior attacks and that it is unaffected by slander attacks. We also investigate the effects of transmission range, velocity, and number of nodes on routing performances.