DocumentCode :
2555452
Title :
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)
Author :
Mahmoud, Abdalla ; Sameh, Ahmed ; El-Kassas, Sherif
Author_Institution :
Dept. of Comput. Sci., Cairo American Univ.
fYear :
2005
fDate :
7-7 Nov. 2005
Lastpage :
794
Abstract :
In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail the security attacks that the ARAN protocol defends against, criticize how an authenticated selfish node can disturb the network by dropping packets or by not cooperating in the routing functionality and propose a reputation-based scheme called reputed-ARAN to detect and defend against selfish nodes
Keywords :
ad hoc networks; mobile radio; routing protocols; telecommunication network topology; telecommunication security; authenticated routing for ad hoc networks; mobile ad hoc networks protocol security; network topology; query-reply dialog; reactive routing protocol; reputation-based scheme; Ad hoc networks; Authentication; Authorization; Computer science; Electronic mail; Mobile ad hoc networks; Network topology; Peer to peer computing; Protection; Routing protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on
Conference_Location :
Washington, DC
Print_ISBN :
0-7803-9465-8
Type :
conf
DOI :
10.1109/MAHSS.2005.1542872
Filename :
1542872
Link To Document :
بازگشت