DocumentCode :
1591979
Title :
Trusted route discovery with TORA protocol
Author :
Pirzada, Asad Amir ; McDonald, Chris
Author_Institution :
Sch. of Comput. Sci. & Software Eng., Univ. of Western Australia, Crawley, WA, Australia
fYear :
2004
Firstpage :
121
Lastpage :
130
Abstract :
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally ordered routing algorithm (TORA) is one of the commonly used protocols for ad-hoc wireless networks. Route discovery in TORA is done in a cooperative manner with intermediate nodes contributing to route generation. Precision in route build-up demands that all network nodes portray persistent benevolent behavior. However, this is not always possible to achieve and a number of malicious nodes may participate in the TORA route discovery process only to sabotage the network by violating the protocol. We present a novel mechanism for establishing trust in ad-hoc networks that execute the TORA protocol. The routes discovered using our model are not cryptographically secure but each one of them carries a confidence measure regarding its suitability in the current scenario.
Keywords :
ad hoc networks; routing protocols; telecommunication security; TORA protocol; ad-hoc network; benevolent behavior; route generation; temporally ordered routing algorithm; trusted route discovery; Ad hoc networks; Authentication; Computer science; Cryptographic protocols; Cryptography; Protection; Road transportation; Routing protocols; Software engineering; Wireless application protocol;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on
Print_ISBN :
0-7695-2096-0
Type :
conf
DOI :
10.1109/DNSR.2004.1344720
Filename :
1344720
Link To Document :
بازگشت