Reputed Authenticated Routing Ad-Hoc Networks Protocol
In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated Routing for Ad Hoc Networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail the security attacks that the ARAN protocol defends against, criticize how an authenticated selfish node can disturb the network by dropping packets or by not cooperating in the routing functionality and propose a reputation-based scheme called Reputed-ARAN to detect and defend against selfish nodes.
KeywordsSource Node Data Packet Destination Node Intermediate Node Malicious Node
- 1.Sanzgiri Kimaya, Laflamme Daniel, Dahill Bridget, Neil Levine Brian, Shields Clay, Belding-Royer Elizabeth M (2005) Authenticated routing for ad hoc networks. MobiComGoogle Scholar
- 2.Michiardi P, Molva R (2002) Simulation-based analysis of security exposures in mobile ad hoc networks. In: Proceedings of European Wireless ConferenceGoogle Scholar
- 3.Dewan P, Dasgupta P (2003) Trusting routers and relays in ad hoc networks. In: First International Workshop on Wireless Security and Privacy in conjunction with IEEE International Conference on Parallel Processing Workshops (ICPP)Google Scholar
- 4.Schneier Bruce (1999) Modeling security threats. Dr Dobb’s JGoogle Scholar
- 5.Buchegger Sonja, Le Boudec Jean-Yves (2002) Performance analysis of the CONFIDANT protocol: Cooperation of Nodes, Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC, Lausanne, CHGoogle Scholar