Dependable Dynamic Source Routing without a trusted third party

  • Authors:
  • Asad Amir Pirzada;Chris McDonald;Amitava Datta

  • Affiliations:
  • The University of Western Australia, Crawley, Western Australia;The University of Western Australia, Crawley, Western Australia;The University of Western Australia, Crawley, Western Australia

  • Venue:
  • ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of their constituent wireless nodes, which are expected to forward packets for other nodes according to a pre-agreed upon protocol. The Dynamic Source Routing (DSR) protocol is one such protocol that helps to create and maintain routes in an ad-hoc network in spite of the dynamic topology. The accurate execution of this protocol requires sustained benevolent behaviour by all nodes participating in the network. This behaviour may not always be observed, and a number of known attacks against the standard DSR protocol can lead to its incorrect execution, and even failure. In this paper, we present a novel technique of discovering and maintaining dependable routes in an ad-hoc network even in the presence of malicious nodes. With the results from extensive simulations, we highlight the efficacy of our scheme and accentuate that it outperforms the DSR protocol when as many as 40% of the nodes are acting maliciously.