Abstract
In this chapter, we first discuss the trust/reputation system called TRIPO. We will discuss how the payment reports can be processed to calculate the nodes’ trust values and how the irrational packet dropping nodes can be identified. We will also discuss and evaluate two routing protocols to establish routes through the highly trusted nodes having sufficient energy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Mahmoud and X. Shen. An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multi-hop wireless networks. IEEE Transactions on Vehicular Technology (IEEE TVT), 60(8):3947–3962, Oct. 2011.
M. Mahmoud and X. Shen. Credit-based mechanism protecting multi-hop wireless networks from rational and irrational packet drop. Proc. of IEEE Global Communication Conference (IEEE GLOBECOM’10), Miami, Florida, USA, Dec. 6–10 2010.
H. Li and M. Singhal. Trust management in distributed systems. IEEE Computers, 40(2):45–53, Feb. 2007.
M. Mahmoud, X. Lin, and X. Shen. Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), to appear.
M. Mahmoud and X. Shen. Trust-based and energy-aware incentive routing protocol for multi-hop wireless networks. Proc. of IEEE International Conference on Communications (IEEE ICC’11), Kyoto, Japan, June 5–9 2011.
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of ACM International Conference on Mobile Computing and Networking (MobiCom’00), Boston, Massachusetts, USA, pages 255–265, Aug. 6–11 2000.
S. Bansal and M. Baker. Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Computer Science Department, Stanford University, CA, USA, Jul. 2003.
S. Buchegger and J. Boudec. Performance analysis of the confidant protocol: cooperation of nodes - fairness in distributed ad hoc networks. Proc. of IEEE/ACM MOBIHOC’02, Switzerland, pages 226–236, Jun. 9–11 2002.
P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Proc. of IFIP CMS’02, Portoroz, Slovenia, pages 107–121, Sep. 26–27 2002.
Q. He, D. Wu, and P. Khosla. A secure incentive architecture for ad-hoc networks. Wireless Communications and Mobile Computing, 6(3):333–346, May 2006.
K. Liu, J. Deng, and K. Balakrishnan. An acknowledgement-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computin, 6(5), May 2007.
C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. Proc. ACM Conference on Computer and Communications Security, CCS02, pages 88–97, 2002.
A. Jsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618–644, 2007.
A. Withby A. Jsang and J. Indulska. Filtering out unfair ratings in bayesian reputation systems. The Icfain Journal of Management Research, 4(2):48–64, 2005.
P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. Proc. of NBER workshop on empirical studies of electronic commerce, 2000.
J. Yoon, M. Liu, and B. Nobles. Sound mobility models. Proc. of ACM MobiCom, San Diego, CA, USA, Sep. 2003.
D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. Mobile Computing, Chapter 5, Kluwer Academic Publishers, pages 153–181, 1996.
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defenses. Proc. of the third International Symposium on Information Processing in Sensor Networks (IPSN), 2004.
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43(12):45–48, 2000.
N. Bhalaji and A. Shanmugam. Reliable routing against selective packet drop attack in dsr based manet. Journal of Software, 4(6):536–543, Aug. 2009.
P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. Proc. of European Wireless Conference, Florence, Italy, Feb. 25–28 2002.
D. Johnson, D. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). technical report, IETF MANET Working Group, Feb. 2007.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Mahmoud, M.M.E.A., Shen, X. (2014). Secure Routing Protocols. In: Security for Multi-hop Wireless Networks. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04603-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-04603-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04602-0
Online ISBN: 978-3-319-04603-7
eBook Packages: Computer ScienceComputer Science (R0)