GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Geographic routing without location information
Proceedings of the 9th annual international conference on Mobile computing and networking
A Secure Routing Protocol for Wireless Ad Hoc Networks
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
A Reliable Approach of Establishing Trust for Wireless Sensor Networks
NPC '07 Proceedings of the 2007 IFIP International Conference on Network and Parallel Computing Workshops
Security in wireless sensor networks: Research Articles
Wireless Communications & Mobile Computing
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Centroid virtual coordinates - A novel near-shortest path routing paradigm
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey of routing attacks in mobile ad hoc networks
IEEE Wireless Communications
Wireless multimedia sensor networks: A survey
IEEE Wireless Communications
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Numerical Analysis of Air Flows for Korean Traditional House
Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The applicability of legacy security solutions is disputable (if not infeasible), due to severe restrictions in node and network resources. Although confidentiality, integrity and authentication measures assist in preventing specific types of attacks, they come at high cost and, in most cases, cannot shield against routing attacks. To face this problem, we propose a secure routing protocol which adopts the geographical routing principle to cope with the network dimensions, and relies on a distributed trust model for the detection and avoidance of malicious neighbours. A novel function which adaptively weights location, trust and energy information drives the routing decisions, allowing for shifting emphasis from security to path optimality. The proposed trust model relies on both direct and indirect observations to derive the trustworthiness of each neighboring node, while it is capable of defending against an increased set of routing attacks including attacks targeting the indirect trust management scheme. Extensive simulation results reveal the advantages of the proposed model.