Reference Hub7
Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs

Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs

Floriano De Rango
Copyright: © 2009 |Volume: 1 |Issue: 4 |Pages: 17
ISSN: 1941-8663|EISSN: 1941-8671|ISSN: 1941-8663|EISBN13: 9781616921033|EISSN: 1941-8671|DOI: 10.4018/jitn.2009092804
Cite Article Cite Article

MLA

De Rango, Floriano. "Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs." IJITN vol.1, no.4 2009: pp.54-70. http://doi.org/10.4018/jitn.2009092804

APA

De Rango, F. (2009). Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 1(4), 54-70. http://doi.org/10.4018/jitn.2009092804

Chicago

De Rango, Floriano. "Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs," International Journal of Interdisciplinary Telecommunications and Networking (IJITN) 1, no.4: 54-70. http://doi.org/10.4018/jitn.2009092804

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.