Skip to main content

Secure Routing Protocols

  • Chapter
  • First Online:
Security for Multi-hop Wireless Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

In this chapter, we first discuss the trust/reputation system called TRIPO. We will discuss how the payment reports can be processed to calculate the nodes’ trust values and how the irrational packet dropping nodes can be identified. We will also discuss and evaluate two routing protocols to establish routes through the highly trusted nodes having sufficient energy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Mahmoud and X. Shen. An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multi-hop wireless networks. IEEE Transactions on Vehicular Technology (IEEE TVT), 60(8):3947–3962, Oct. 2011.

    Google Scholar 

  2. M. Mahmoud and X. Shen. Credit-based mechanism protecting multi-hop wireless networks from rational and irrational packet drop. Proc. of IEEE Global Communication Conference (IEEE GLOBECOM’10), Miami, Florida, USA, Dec. 6–10 2010.

    Google Scholar 

  3. H. Li and M. Singhal. Trust management in distributed systems. IEEE Computers, 40(2):45–53, Feb. 2007.

    Article  Google Scholar 

  4. M. Mahmoud, X. Lin, and X. Shen. Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), to appear.

    Google Scholar 

  5. M. Mahmoud and X. Shen. Trust-based and energy-aware incentive routing protocol for multi-hop wireless networks. Proc. of IEEE International Conference on Communications (IEEE ICC’11), Kyoto, Japan, June 5–9 2011.

    Google Scholar 

  6. S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of ACM International Conference on Mobile Computing and Networking (MobiCom’00), Boston, Massachusetts, USA, pages 255–265, Aug. 6–11 2000.

    Google Scholar 

  7. S. Bansal and M. Baker. Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Computer Science Department, Stanford University, CA, USA, Jul. 2003.

    Google Scholar 

  8. S. Buchegger and J. Boudec. Performance analysis of the confidant protocol: cooperation of nodes - fairness in distributed ad hoc networks. Proc. of IEEE/ACM MOBIHOC’02, Switzerland, pages 226–236, Jun. 9–11 2002.

    Google Scholar 

  9. P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Proc. of IFIP CMS’02, Portoroz, Slovenia, pages 107–121, Sep. 26–27 2002.

    Google Scholar 

  10. Q. He, D. Wu, and P. Khosla. A secure incentive architecture for ad-hoc networks. Wireless Communications and Mobile Computing, 6(3):333–346, May 2006.

    Article  Google Scholar 

  11. K. Liu, J. Deng, and K. Balakrishnan. An acknowledgement-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computin, 6(5), May 2007.

    Google Scholar 

  12. C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. Proc. ACM Conference on Computer and Communications Security, CCS02, pages 88–97, 2002.

    Google Scholar 

  13. A. Jsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618–644, 2007.

    Article  Google Scholar 

  14. A. Withby A. Jsang and J. Indulska. Filtering out unfair ratings in bayesian reputation systems. The Icfain Journal of Management Research, 4(2):48–64, 2005.

    Google Scholar 

  15. P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. Proc. of NBER workshop on empirical studies of electronic commerce, 2000.

    Google Scholar 

  16. J. Yoon, M. Liu, and B. Nobles. Sound mobility models. Proc. of ACM MobiCom, San Diego, CA, USA, Sep. 2003.

    Google Scholar 

  17. D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. Mobile Computing, Chapter 5, Kluwer Academic Publishers, pages 153–181, 1996.

    Google Scholar 

  18. J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defenses. Proc. of the third International Symposium on Information Processing in Sensor Networks (IPSN), 2004.

    Google Scholar 

  19. P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43(12):45–48, 2000.

    Article  Google Scholar 

  20. N. Bhalaji and A. Shanmugam. Reliable routing against selective packet drop attack in dsr based manet. Journal of Software, 4(6):536–543, Aug. 2009.

    Article  Google Scholar 

  21. P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. Proc. of European Wireless Conference, Florence, Italy, Feb. 25–28 2002.

    Google Scholar 

  22. D. Johnson, D. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). technical report, IETF MANET Working Group, Feb. 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Mahmoud, M.M.E.A., Shen, X. (2014). Secure Routing Protocols. In: Security for Multi-hop Wireless Networks. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04603-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04603-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04602-0

  • Online ISBN: 978-3-319-04603-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics