skip to main content
10.1145/986537.986558acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

Trust based adaptive on demand ad hoc routing protocol

Published:02 April 2004Publication History

ABSTRACT

In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already proposed, they are not efficient, in the sense that, they use the same kind of encryption algorithms (mostly high level) for every bit of routing information they pass from one intermediate node to another in the routing path. This consumes lot of energy/power as well as time. Our routing algorithm basically behaves depending upon the trust one node has on its neighbor. The trust factor and the level of security assigned to the information flow decide what level of encryption is applied to the current routing information at a source/intermediate node. In other words, above a certain level of trust level, there is no need for the source/intermediate node to perform high level encryption on the routing information as it completely trusts the neighboring node. So based on level of trust factor, the routing information will be low-level, medium level, high level encrypted, the low-level being normal AODV. This not only saves the node's power by avoiding unnecessary encoding, but also in terms of time, which is very much valuable in cases of emergencies where the information is as valuable as the time.

References

  1. NS-2 with Wireless and Mobility Extensions, available via website http://www.monarch.cs.cmu.eduGoogle ScholarGoogle Scholar
  2. http://moment.cs.ucsb.edu/AODV/aodv.htmlGoogle ScholarGoogle Scholar
  3. S. J. Lee, M. Gerla and C. K Toh. A Simulation Study of Table-Driven and On-Demand Routing Protocols for Mobile Ad Hoc Netwroks, IEEE Network, Jul. 1999 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonymns, Communications of the ACM, 24(2):84--88, 1981 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. K. Marina and S. R. Das. Ad Hoc On-demand Multipath Distance Vector Routing. In ICNP, Pages 14--23, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Onion Routing, http://www.onion-router.net/Google ScholarGoogle Scholar
  7. P. Papadimitratos and Z. Haas. Secure Routing for Mobile Ad Hoc Networks. Ins SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), 2002.Google ScholarGoogle Scholar
  8. S, Yi, P. Naldurg, R. Kavets. Security-Aware Ad Hoc Routing for Wireless Networks. Technical Reprt, UIUCDCS-R-2001-2241, UILU-ENG-2001-1748. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Zhou and Z. Hass. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6), November, December 1999.Google ScholarGoogle Scholar
  10. Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad-Hoc Networks, MOBICOM 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Zhu, S. Xu, S. Setia, S. Jajodia. LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. George Mason University and University of California at Irvine.Google ScholarGoogle Scholar
  12. Marina Dupcinov, Srdjan Krco. Routing in ad hoc Networks, Technical Report, Applied Research Lab, EEI, Ericsson, Ireland, 2002.Google ScholarGoogle Scholar
  13. David B. Johnson, David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  14. Yin-Chun Hu, Adrian Perrig, David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad-Hoc Networks, MOBICOM 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Kong, Xiaoyan Hong. ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks. MOBIHOC, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Tom Goff, B. Nael, Abu-Ghazaleh, Dhananjay. S. Phatak and Ridvan Kahvecioglu, Preemptive Routing in Ad Hoc Networks. ACM SIGMOBILE, July, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Broch, D. A. Maltz, D. B. Johnson, Y-C. Hu, J. Jetcheva, A Performance Copmaprioson of Mulit-Hop Wireless Ad Hoc Routing Protocols, In the Proceedings of the 4th International Conference on Mobile Computing and Networking, ACM MOBICOM '98, pp. 85--97, Oct 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Trust based adaptive on demand ad hoc routing protocol

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ACM-SE 42: Proceedings of the 42nd annual Southeast regional conference
          April 2004
          485 pages
          ISBN:1581138709
          DOI:10.1145/986537
          • General Chair:
          • Seong-Moo Yoo,
          • Program Chair:
          • Letha Hughes Etzkorn

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 April 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate134of240submissions,56%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader