Skip to main content
Log in

Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Network Processor (NP) is optimized to perform network tasks. It uses massive parallel processing architecture to achieve high performance. Ad hoc network is an exciting research aspect due to the characters of self-organization, dynamically topology and temporary network life. However, all the characters make the security problem more serious. Denial-of-Service (DoS) attack is the main puzzle in the security of Ad hoc network. A novel NP-based trustworthy agent scheme is proposed to combat the attack. Trustworthy agent is established by a hardware thread in NP. Agent can update itself at some interval by the trustworthiness of the neighbor nodes. Agent can trace the RREQ and RREP messages stream to aggregate the key information and analyze them by intrusion detection algorithm. NS2 simulator is expanded to validate the security and trustworthy scheme. Simulation results show that NP-based trustworthy agent scheme is effective to detect DoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. B. Liljeqvist, “Visions and Facts – A Survey of Network Processors”, Master’s Thesis, (2003)

  2. Zhou L., Haas Z.J., (1999). “Securing Ad Hoc Networks”. J. IEEE Networks. 13(6): 24–30

    Article  Google Scholar 

  3. J.P. HuBaux, L. Buttyan, and S. Capkun, “The Quest for Security in Mobile Ad Hoc Networks”, in Proc. ACM MOBICOM, 2001.

  4. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad Hoc Networks”, in Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), August, pp. 275–283, 2000.

  5. H. Deng, Q.-A. Zeng and D.P. Agrawal, “SVM-based Intrusion Detection System for Wireless Ad Hoc Networks”, in Proceedings of the IEEE Vehicular Technology Conference (VTC’03), Orlando, October 6–9, 2003.

  6. O. Kachirski and R. Guha, “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks”, in Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS’03), Vol. 02, pp. 57–65, Feb. 2003.

  7. C. Perkins, E. Royer, S. Das and I. Chakeres, “Ad Hoc On-demand Distance Vector (AODV) Routing”, Internet Draft, draft-ietf-manet-aodv-13.txt, Feb. 2003.

  8. C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and countermeasures”, in First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 1–15, 2003.

  9. E. Khan, “Network Processors for Communication Security: A Review”, IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, pp. 173–176, 2003.

  10. Johnny W.S.K., Armin M.R., (1999). “Intelligent Mobile Agents in Large Distributed Systems”. J. Systems Software. 47, 75–87

    Article  Google Scholar 

  11. http://www.isi.edu/nsnam/ns

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chen Hongsong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hongsong, C., Zhaoshun, W., Guangping, Z. et al. Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol. Wireless Pers Commun 42, 49–62 (2007). https://doi.org/10.1007/s11277-006-9166-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-006-9166-y

Keywords

Navigation