Self-monitoring security in ad hoc routing

  • Authors:
  • J. A. Ploskonka;A. R. Hurson

  • Affiliations:
  • Department of Computer Science and Engineering, The Pennsylvania State University, University Park, Pennsylvania;Department of Computer Science and Engineering, The Pennsylvania State University, University Park, Pennsylvania

  • Venue:
  • ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Ad hoc networks are useful in a variety of applications, particularly in areas where creating a network infrastructure is not cost effective or when timeliness is important, such as military or rescue operations. The sensitivity of these uses for ad hoc networks makes routing security an important consideration. Unlike traditional networks, in ad hoc networks each node participates in routing functions. A malicious node could introduce serious disruptions in the network by advertising false routing information or not participating in packet forwarding. We introduce modifications to the proposed AODV-S routing protocol to reduce energy consumption associated with the security solution. Both protocols are simulated and the performance is compared with AODV. These results are presented and analyzed. Additionally, the application of ad hoc networks and the proposed AODV-SMS protocol in an information sharing environment is discussed.