Advertisement

Reputed Authenticated Routing Ad-Hoc Networks Protocol

  • Ahmed Sameh
  • Abdalla Mahmoud
  • Sherif El-Kassas
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 28)

Abstract

In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated Routing for Ad Hoc Networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail the security attacks that the ARAN protocol defends against, criticize how an authenticated selfish node can disturb the network by dropping packets or by not cooperating in the routing functionality and propose a reputation-based scheme called Reputed-ARAN to detect and defend against selfish nodes.

Keywords

Source Node Data Packet Destination Node Intermediate Node Malicious Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Sanzgiri Kimaya, Laflamme Daniel, Dahill Bridget, Neil Levine Brian, Shields Clay, Belding-Royer Elizabeth M (2005) Authenticated routing for ad hoc networks. MobiComGoogle Scholar
  2. 2.
    Michiardi P, Molva R (2002) Simulation-based analysis of security exposures in mobile ad hoc networks. In: Proceedings of European Wireless ConferenceGoogle Scholar
  3. 3.
    Dewan P, Dasgupta P (2003) Trusting routers and relays in ad hoc networks. In: First International Workshop on Wireless Security and Privacy in conjunction with IEEE International Conference on Parallel Processing Workshops (ICPP)Google Scholar
  4. 4.
    Schneier Bruce (1999) Modeling security threats. Dr Dobb’s JGoogle Scholar
  5. 5.
    Buchegger Sonja, Le Boudec Jean-Yves (2002) Performance analysis of the CONFIDANT protocol: Cooperation of Nodes, Fairness In Dynamic Ad-hoc NeTworks. In: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC, Lausanne, CHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Ahmed Sameh
    • 1
  • Abdalla Mahmoud
    • 1
  • Sherif El-Kassas
    • 1
  1. 1.Department of Computer ScienceThe American University in CairoEgypt

Personalised recommendations