Abstract
Network Processor (NP) is optimized to perform network tasks. It uses massive parallel processing architecture to achieve high performance. Ad hoc network is an exciting research aspect due to the characters of self-organization, dynamically topology and temporary network life. However, all the characters make the security problem more serious. Denial-of-Service (DoS) attack is the main puzzle in the security of Ad hoc network. A novel NP-based trustworthy agent scheme is proposed to combat the attack. Trustworthy agent is established by a hardware thread in NP. Agent can update itself at some interval by the trustworthiness of the neighbor nodes. Agent can trace the RREQ and RREP messages stream to aggregate the key information and analyze them by intrusion detection algorithm. NS2 simulator is expanded to validate the security and trustworthy scheme. Simulation results show that NP-based trustworthy agent scheme is effective to detect DoS attacks.
Similar content being viewed by others
References
B. Liljeqvist, “Visions and Facts – A Survey of Network Processors”, Master’s Thesis, (2003)
Zhou L., Haas Z.J., (1999). “Securing Ad Hoc Networks”. J. IEEE Networks. 13(6): 24–30
J.P. HuBaux, L. Buttyan, and S. Capkun, “The Quest for Security in Mobile Ad Hoc Networks”, in Proc. ACM MOBICOM, 2001.
Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad Hoc Networks”, in Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), August, pp. 275–283, 2000.
H. Deng, Q.-A. Zeng and D.P. Agrawal, “SVM-based Intrusion Detection System for Wireless Ad Hoc Networks”, in Proceedings of the IEEE Vehicular Technology Conference (VTC’03), Orlando, October 6–9, 2003.
O. Kachirski and R. Guha, “Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks”, in Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS’03), Vol. 02, pp. 57–65, Feb. 2003.
C. Perkins, E. Royer, S. Das and I. Chakeres, “Ad Hoc On-demand Distance Vector (AODV) Routing”, Internet Draft, draft-ietf-manet-aodv-13.txt, Feb. 2003.
C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and countermeasures”, in First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 1–15, 2003.
E. Khan, “Network Processors for Communication Security: A Review”, IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, pp. 173–176, 2003.
Johnny W.S.K., Armin M.R., (1999). “Intelligent Mobile Agents in Large Distributed Systems”. J. Systems Software. 47, 75–87
http://www.isi.edu/nsnam/ns
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hongsong, C., Zhaoshun, W., Guangping, Z. et al. Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol. Wireless Pers Commun 42, 49–62 (2007). https://doi.org/10.1007/s11277-006-9166-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-006-9166-y