[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Collaborative Dynamic Source Routing using transitional trust filters

Published: 01 June 2007 Publication History

Abstract

The DSR protocol is frequently used to establish communication in mobile ad-hoc wireless networks. For effective functioning of the protocol it is essential that no malicious nodes should participate in its execution. In this paper, we present a novel scheme for identifying and isolating malicious nodes in a DSR based network. We make use of special trust filters that are implemented and executed by the benevolent nodes. Through extensive simulations, we demonstrate that the filtered DSR protocol augments the performance of the standard DSR protocol by up to 30% in a network where 40% of the nodes act maliciously.

References

[1]
Aad, I., Hubaux, J-P. and Knightly, E.W. (2004) 'Denial of service resilience in ad hoc networks', Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 202-215.
[2]
Buchegger, S. and Boudec, J. (2002) 'Performance analysis of the confidant protocol: cooperation of nodes - fairness in distributed ad-hoc networks', Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), pp. 226-236.
[3]
Buttyan, L. and Hubaux, J. (2000) 'Enforcing service availability in mobile ad-hoc wans', Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), pp. 87-96.
[4]
Buttyan, L. and Hubaux, J. (2003) 'Stimulating cooperation in self-organizing mobile ad hoc networks', Proceedings of the ACM/Kluwer Mobile Networks and Applications (MONET), Vol. 8, pp. 579-592.
[5]
Carter, S. and Yasinsac, A. (2002) 'Secure position aided ad hoc routing protocol', Proceedings of the IASTED Conference on Communications and Computer Networks (CCN), pp. 329-334.
[6]
Dahill, B., Levine, B.N., Royer, E. and Shields, C. (2002) 'A secure routing protocol for ad hoc networks', Proceedings of the International Conference on Network Protocols (ICNP), pp. 78-87.
[7]
Diestel, R. (2000) Graph Theory, 2nd ed., Springer-Verlag, Heidelberg.
[8]
Dijkstra, E.W. (1959) 'A note on two problems in connection with graphs', Numerische Mathematik, pp. 83-89.
[9]
Garfinkel, S. (1995) PGP: Pretty Good Privacy, O'Reilly and Associates, Inc., Sebastopol, CA.
[10]
Hu, Y.C. and Johnson, D.B. (2000) 'Caching strategies in on-demand routing protocols for wireless ad hoc networks', Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 231-242.
[11]
Hu, Y.C., Perrig, A. and Johnson, D.B. (2002) 'Ariadne: a secure on-demand routing protocol for ad hoc networks', Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 12-23.
[12]
Johnson, D.B., Maltz, D.A. and Hu, Y. (2003) 'The dynamic source routing protocol for mobile ad hoc networks (DSR)', IETF MANET, Internet Draft.
[13]
Josang, A. (1996) 'The right type of trust for distributed systems', Proceedings of the ACM New Security Paradigms Workshop, pp. 119-131.
[14]
Kachirski, O. and Guha, R. (2002) 'Intrusion detection using mobile agents in wireless ad hoc networks', Proceedings of the IEEE Workshop on Knowledge Media Networking (KMN), pp. 153-158.
[15]
Marti, S., Giuli, T., Lai, K. and Baker, M. (2000) 'Mitigating routing misbehavior in mobile ad hoc networks', Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 255-265.
[16]
Michiardi, P. and Molva, R. (2002) 'Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks', Proceedings of the Sixth IFIP Conference on Security Communications, and Multimedia (CMS), Vol. 228, pp. 107-121.
[17]
Nasipuri, A. and Das, S. (1999) 'On-demand multipath routing for mobile ad hoc networks', Proceedings of the Eight International Conference on Computer Communications and Networks, pp. 64-70.
[18]
NS (1989) The Network Simulator, http://www.isi.edu/nsnam/ns/.
[19]
Pirzada, A.A. and McDonald, C. (2004a) 'Kerberos assisted authentication in mobile ad-hoc networks', Proceedings of the 27th Australasian Computer Science Conference (ACSC), Vol. 26, No. 1, pp. 41-46.
[20]
Pirzada, A.A. and McDonald, C. (2004b) 'Secure routing protocols for mobile ad-hoc wireless networks', in Wysocki, T.A., Dadej, A. and Wysocki, B.J. (Eds.): Advanced Wired and Wireless Networks, Springer, New York.
[21]
Royer, E.M. and Toh, C.K. (1999) 'A review of current routing protocols for ad hoc mobile wireless networks', IEEE Personal Communications Magazine, Vol. 6, No. 2, pp. 46-55.
[22]
Stajano, F. and Anderson, R. (1999) 'The resurrecting duckling: security issues for ad hoc wireless networks', Proceedings of the 7th International Workshop on Security Protocols, pp. 172-194.
[23]
Stallings, W. (2000) Network Security Essentials, Prentice-Hall, Book, Upper Saddle River, NJ.
[24]
Yuen, W.H. and Yates, R.D. (2002) 'Inter-relationships of performance metrics and system parameters in mobile ad hoc networks', Proceedings of the IEEE MILCOM, Vol. 1, pp. 519-524.
[25]
Zhang, Y. and Lee, W. (2000) 'Intrusion detection in wireless ad hoc networks', Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 275-283.
  1. Collaborative Dynamic Source Routing using transitional trust filters

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image International Journal of Information and Computer Security
    International Journal of Information and Computer Security  Volume 1, Issue 3
    June 2007
    130 pages
    ISSN:1744-1765
    EISSN:1744-1773
    Issue’s Table of Contents

    Publisher

    Inderscience Publishers

    Geneva 15, Switzerland

    Publication History

    Published: 01 June 2007

    Author Tags

    1. DSR protocol
    2. ad hoc networks
    3. collaborative dynamic source routing
    4. computer security
    5. information security
    6. malicious nodes
    7. mobile networks
    8. protocols
    9. simulation
    10. systems assurance
    11. transitional trust filters
    12. trust
    13. wireless networks

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Dec 2024

    Other Metrics

    Citations

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media