Skip to main content

2014 | OriginalPaper | Buchkapitel

4. Secure Routing Protocols

verfasst von : Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen

Erschienen in: Security for Multi-hop Wireless Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we first discuss the trust/reputation system called TRIPO. We will discuss how the payment reports can be processed to calculate the nodes’ trust values and how the irrational packet dropping nodes can be identified. We will also discuss and evaluate two routing protocols to establish routes through the highly trusted nodes having sufficient energy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat M. Mahmoud and X. Shen. An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multi-hop wireless networks. IEEE Transactions on Vehicular Technology (IEEE TVT), 60(8):3947–3962, Oct. 2011. M. Mahmoud and X. Shen. An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multi-hop wireless networks. IEEE Transactions on Vehicular Technology (IEEE TVT), 60(8):3947–3962, Oct. 2011.
2.
Zurück zum Zitat M. Mahmoud and X. Shen. Credit-based mechanism protecting multi-hop wireless networks from rational and irrational packet drop. Proc. of IEEE Global Communication Conference (IEEE GLOBECOM’10), Miami, Florida, USA, Dec. 6–10 2010. M. Mahmoud and X. Shen. Credit-based mechanism protecting multi-hop wireless networks from rational and irrational packet drop. Proc. of IEEE Global Communication Conference (IEEE GLOBECOM’10), Miami, Florida, USA, Dec. 6–10 2010.
3.
Zurück zum Zitat H. Li and M. Singhal. Trust management in distributed systems. IEEE Computers, 40(2):45–53, Feb. 2007.CrossRef H. Li and M. Singhal. Trust management in distributed systems. IEEE Computers, 40(2):45–53, Feb. 2007.CrossRef
4.
Zurück zum Zitat M. Mahmoud, X. Lin, and X. Shen. Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), to appear. M. Mahmoud, X. Lin, and X. Shen. Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), to appear.
5.
Zurück zum Zitat M. Mahmoud and X. Shen. Trust-based and energy-aware incentive routing protocol for multi-hop wireless networks. Proc. of IEEE International Conference on Communications (IEEE ICC’11), Kyoto, Japan, June 5–9 2011. M. Mahmoud and X. Shen. Trust-based and energy-aware incentive routing protocol for multi-hop wireless networks. Proc. of IEEE International Conference on Communications (IEEE ICC’11), Kyoto, Japan, June 5–9 2011.
6.
Zurück zum Zitat S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of ACM International Conference on Mobile Computing and Networking (MobiCom’00), Boston, Massachusetts, USA, pages 255–265, Aug. 6–11 2000. S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. Proc. of ACM International Conference on Mobile Computing and Networking (MobiCom’00), Boston, Massachusetts, USA, pages 255–265, Aug. 6–11 2000.
7.
Zurück zum Zitat S. Bansal and M. Baker. Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Computer Science Department, Stanford University, CA, USA, Jul. 2003. S. Bansal and M. Baker. Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Computer Science Department, Stanford University, CA, USA, Jul. 2003.
8.
Zurück zum Zitat S. Buchegger and J. Boudec. Performance analysis of the confidant protocol: cooperation of nodes - fairness in distributed ad hoc networks. Proc. of IEEE/ACM MOBIHOC’02, Switzerland, pages 226–236, Jun. 9–11 2002. S. Buchegger and J. Boudec. Performance analysis of the confidant protocol: cooperation of nodes - fairness in distributed ad hoc networks. Proc. of IEEE/ACM MOBIHOC’02, Switzerland, pages 226–236, Jun. 9–11 2002.
9.
Zurück zum Zitat P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Proc. of IFIP CMS’02, Portoroz, Slovenia, pages 107–121, Sep. 26–27 2002. P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Proc. of IFIP CMS’02, Portoroz, Slovenia, pages 107–121, Sep. 26–27 2002.
10.
Zurück zum Zitat Q. He, D. Wu, and P. Khosla. A secure incentive architecture for ad-hoc networks. Wireless Communications and Mobile Computing, 6(3):333–346, May 2006.CrossRef Q. He, D. Wu, and P. Khosla. A secure incentive architecture for ad-hoc networks. Wireless Communications and Mobile Computing, 6(3):333–346, May 2006.CrossRef
11.
Zurück zum Zitat K. Liu, J. Deng, and K. Balakrishnan. An acknowledgement-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computin, 6(5), May 2007. K. Liu, J. Deng, and K. Balakrishnan. An acknowledgement-based approach for the detection of routing misbehavior in manets. IEEE Transactions on Mobile Computin, 6(5), May 2007.
12.
Zurück zum Zitat C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. Proc. ACM Conference on Computer and Communications Security, CCS02, pages 88–97, 2002. C. Cachin, K. Kursawe, A. Lysyanskaya, and R. Strobl. Asynchronous verifiable secret sharing and proactive cryptosystems. Proc. ACM Conference on Computer and Communications Security, CCS02, pages 88–97, 2002.
13.
Zurück zum Zitat A. Jsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618–644, 2007.CrossRef A. Jsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618–644, 2007.CrossRef
14.
Zurück zum Zitat A. Withby A. Jsang and J. Indulska. Filtering out unfair ratings in bayesian reputation systems. The Icfain Journal of Management Research, 4(2):48–64, 2005. A. Withby A. Jsang and J. Indulska. Filtering out unfair ratings in bayesian reputation systems. The Icfain Journal of Management Research, 4(2):48–64, 2005.
15.
Zurück zum Zitat P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. Proc. of NBER workshop on empirical studies of electronic commerce, 2000. P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. Proc. of NBER workshop on empirical studies of electronic commerce, 2000.
16.
Zurück zum Zitat J. Yoon, M. Liu, and B. Nobles. Sound mobility models. Proc. of ACM MobiCom, San Diego, CA, USA, Sep. 2003. J. Yoon, M. Liu, and B. Nobles. Sound mobility models. Proc. of ACM MobiCom, San Diego, CA, USA, Sep. 2003.
17.
Zurück zum Zitat D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. Mobile Computing, Chapter 5, Kluwer Academic Publishers, pages 153–181, 1996. D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. Mobile Computing, Chapter 5, Kluwer Academic Publishers, pages 153–181, 1996.
18.
Zurück zum Zitat J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defenses. Proc. of the third International Symposium on Information Processing in Sensor Networks (IPSN), 2004. J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defenses. Proc. of the third International Symposium on Information Processing in Sensor Networks (IPSN), 2004.
19.
Zurück zum Zitat P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43(12):45–48, 2000.CrossRef P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43(12):45–48, 2000.CrossRef
20.
Zurück zum Zitat N. Bhalaji and A. Shanmugam. Reliable routing against selective packet drop attack in dsr based manet. Journal of Software, 4(6):536–543, Aug. 2009.CrossRef N. Bhalaji and A. Shanmugam. Reliable routing against selective packet drop attack in dsr based manet. Journal of Software, 4(6):536–543, Aug. 2009.CrossRef
21.
Zurück zum Zitat P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. Proc. of European Wireless Conference, Florence, Italy, Feb. 25–28 2002. P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. Proc. of European Wireless Conference, Florence, Italy, Feb. 25–28 2002.
22.
Zurück zum Zitat D. Johnson, D. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). technical report, IETF MANET Working Group, Feb. 2007. D. Johnson, D. Maltz, and Y. Hu. The dynamic source routing protocol for mobile ad hoc networks (dsr). technical report, IETF MANET Working Group, Feb. 2007.
Metadaten
Titel
Secure Routing Protocols
verfasst von
Mohamed M. E. A. Mahmoud
Xuemin (Sherman) Shen
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-04603-7_4