scispace - formally typeset
Proceedings ArticleDOI

Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks

Reads0
Chats0
TLDR
An extension of T-AODV that can withstand attack by multiple malicious nodes acting in collusion to disrupt the network is proposed, which finds a secure end-to-end path free of malicious nodes and can effectively isolate a malicious entity trying to attack the network independently or in collusion with other malicious entities.
Abstract
The Trust-embedded AODV (T-AODV) routing protocol was designed by us to secure the ad hoc network from independent malicious nodes by finding a secure end-to-end route. In This work we have proposed an extension of T-AODV that can withstand attack by multiple malicious nodes acting in collusion to disrupt the network. It finds a secure end-to-end path free of malicious nodes and can effectively isolate a malicious entity trying to attack the network independently or in collusion with other malicious entities. In this respect, the solution is unique and, to the best of our knowledge, the first such solution proposed so far. We have shown the efficiency of our protocol by extensive simulation and also analyzed its security by evaluating different threat scenarios.

read more

Citations
More filters
Journal ArticleDOI

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

TL;DR: TARF, a robust trust-aware routing framework for dynamic WSNs, is designed and implemented and proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments.
Journal ArticleDOI

Game Theory for Cyber Security and Privacy

TL;DR: This survey demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employgame theory to establish a comprehensive understanding of emergingSecurity and privacy problems in cyberspace and potential solutions.
Proceedings ArticleDOI

A framework for trust-based cluster head election in wireless sensor networks

TL;DR: A distributed trust-based framework and a mechanism for the election of trustworthy cluster heads that reduces the likelihood of compromised and or malicious nodes from being selected as cluster heads.
Journal ArticleDOI

Towards designing a trusted routing solution in mobile ad hoc networks

TL;DR: This paper has designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from the neighbors and extended the solution to secure the network against colluding malicious nodes, which is the first such solution proposed.
Journal ArticleDOI

Cryptographic Versus Trust-based Methods for MANET Routing Security

TL;DR: This paper gives the first comparison of SAODV and TAODV, two MANET routing protocols, which address routing security through cryptographic and trust-based means respectively, and provides performance comparisons on actual resource-limited hardware.
References
More filters
Proceedings ArticleDOI

Ad-hoc on-demand distance vector routing

TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Proceedings ArticleDOI

A secure routing protocol for ad hoc networks

TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Proceedings ArticleDOI

Performance analysis of the CONFIDANT protocol

TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.