Proceedings ArticleDOI
Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks
Tirthankar Ghosh,Niki Pissinou,Kia Makki +2 more
- pp 224-231
Reads0
Chats0
TLDR
An extension of T-AODV that can withstand attack by multiple malicious nodes acting in collusion to disrupt the network is proposed, which finds a secure end-to-end path free of malicious nodes and can effectively isolate a malicious entity trying to attack the network independently or in collusion with other malicious entities.Abstract:
The Trust-embedded AODV (T-AODV) routing protocol was designed by us to secure the ad hoc network from independent malicious nodes by finding a secure end-to-end route. In This work we have proposed an extension of T-AODV that can withstand attack by multiple malicious nodes acting in collusion to disrupt the network. It finds a secure end-to-end path free of malicious nodes and can effectively isolate a malicious entity trying to attack the network independently or in collusion with other malicious entities. In this respect, the solution is unique and, to the best of our knowledge, the first such solution proposed so far. We have shown the efficiency of our protocol by extensive simulation and also analyzed its security by evaluating different threat scenarios.read more
Citations
More filters
Journal ArticleDOI
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
TL;DR: TARF, a robust trust-aware routing framework for dynamic WSNs, is designed and implemented and proves effective against those harmful attacks developed out of identity deception; the resilience of TARF is verified through extensive evaluation with both simulation and empirical experiments.
Journal ArticleDOI
Game Theory for Cyber Security and Privacy
Cuong T. Do,Nguyen H. Tran,Choong Seon Hong,Charles A. Kamhoua,Kevin Kwiat,Erik Blasch,Shaolei Ren,Niki Pissinou,S. Sitharama Iyengar +8 more
TL;DR: This survey demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employgame theory to establish a comprehensive understanding of emergingSecurity and privacy problems in cyberspace and potential solutions.
Proceedings ArticleDOI
A framework for trust-based cluster head election in wireless sensor networks
TL;DR: A distributed trust-based framework and a mechanism for the election of trustworthy cluster heads that reduces the likelihood of compromised and or malicious nodes from being selected as cluster heads.
Journal ArticleDOI
Towards designing a trusted routing solution in mobile ad hoc networks
TL;DR: This paper has designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from the neighbors and extended the solution to secure the network against colluding malicious nodes, which is the first such solution proposed.
Journal ArticleDOI
Cryptographic Versus Trust-based Methods for MANET Routing Security
Jared Cordasco,Susanne Wetzel +1 more
TL;DR: This paper gives the first comparison of SAODV and TAODV, two MANET routing protocols, which address routing security through cryptographic and trust-based means respectively, and provides performance comparisons on actual resource-limited hardware.
References
More filters
Proceedings ArticleDOI
Ad-hoc on-demand distance vector routing
C.E. Perkins,E.M. Royer +1 more
TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Journal ArticleDOI
Securing ad hoc networks
Lidong Zhou,Zygmunt J. Haas +1 more
TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Proceedings ArticleDOI
A secure routing protocol for ad hoc networks
TL;DR: This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.
Proceedings ArticleDOI
Performance analysis of the CONFIDANT protocol
TL;DR: It is shown that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network.