Paper
18 April 2008 Credibility based secure route finding in wireless ad hoc networks
Author Affiliations +
Abstract
Existing Ad Hoc routing protocols are mostly based on efficiency-driven protocols. Malicious nodes can easily impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping or black hole attacks without being detected. It is virtually impossible to find out these kinds of malicious before they attack, therefore it would be sensible to base detection of malicious nodes on post route discovery stage, i.e. when packets are transmitted on discovered routes. In this paper we shall review existing techniques for secure routing and propose to use credibility based route finding protocols. Each node would monitor its neighbors' pattern of delivering packets and regularly update their "credibility" according to certain criteria. The level of trust in any route will be based on the credits associated with the neighbor belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks. We will discuss problems we encountered and our solutions. We would also further develop the protocol, to investigate the possibility of using the unique prime factorization theory to enable nodes acquiring more trust knowledge beyond its immediate neighborhood. Such an approach helps to further secure route-finding procedures.
© (2008) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Fanzhi Li, Ali Al-Sherbaz, Sabah Jassim, and Chris Adams "Credibility based secure route finding in wireless ad hoc networks", Proc. SPIE 6982, Mobile Multimedia/Image Processing, Security, and Applications 2008, 698204 (18 April 2008); https://doi.org/10.1117/12.777589
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer simulations

Information security

Cryptography

Device simulation

Computer security

Data transmission

RELATED CONTENT


Back to Top