An energy and trust-aware routing protocol for large wireless sensor networks
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
Energy-aware secure routing for large wireless sensor networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Location-aided secure routing scheme in mobile ad hoc networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Combining trust with location information for routing in wireless sensor networks
Wireless Communications & Mobile Computing
Auction-based task allocation with trust management for shared sensor networks
Security and Communication Networks
A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks
Wireless Personal Communications: An International Journal
AODV-based technique for quick and secure local recovery from link failures in MANETs
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
Ad hoc networks, which do not rely on infrastructure such as access points or base stations, can be deployed rapidly and inexpensively even in situations with geographical or time constraints. Ad hoc networks have attractive applications in both military and disaster situations and also in commercial uses like sensor networks or conferencing. However, the nature of ad hoc networks makes them vulnerable to attacks, especially in the routing protocol. How to protect an ad hoc routing protocol is an important research topic. In this paper, we present an on-demand secure routing protocol for ad hoc networks based on a distributed authentication mechanism. The protocol makes use of recommendation and trust evaluation to establish a trust relationship between network entities and uses feedback to adjust it. The protocol does not need the support of a trusted third party and can discover multiple routes between two nodes.