Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
BARC: A Battery Aware Reliable Clustering algorithm for sensor networks
Journal of Network and Computer Applications
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Trust-aware in-network aggregation for wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
THWMP: trust based secure routing for wireless mesh networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Collaborative trust-based shortest secure path discovery in mobile ad hoc networks
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
FRI-attack: fraduelent routing information attack on wireless mesh network
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |
The Trust-embedded AODV (T-AODV) routing protocol was designed by us to secure the ad hoc network from independent malicious nodes by finding a secure end-to-end route. In this paper we have proposed an extension of T-AODV that can withstand attack by multiple malicious nodes acting in collusion to disrupt the network. It finds a secure end-to-end path free of malicious nodes and can effectively isolate a malicious entity trying to attack the network independently or in collusion with other malicious entities. In this respect, the solution is unique and, to the best of our knowledge, the first such solution proposed so far. We have shown the efficiency of our protocol by extensive simulation and also analyzed its security by evaluating different threat scenarios.