Title :
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)
Author :
Mahmoud, Abdalla ; Sameh, Ahmed ; El-Kassas, Sherif
Author_Institution :
Dept. of Comput. Sci., Cairo American Univ.
Abstract :
In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail the security attacks that the ARAN protocol defends against, criticize how an authenticated selfish node can disturb the network by dropping packets or by not cooperating in the routing functionality and propose a reputation-based scheme called reputed-ARAN to detect and defend against selfish nodes
Keywords :
ad hoc networks; mobile radio; routing protocols; telecommunication network topology; telecommunication security; authenticated routing for ad hoc networks; mobile ad hoc networks protocol security; network topology; query-reply dialog; reactive routing protocol; reputation-based scheme; Ad hoc networks; Authentication; Authorization; Computer science; Electronic mail; Mobile ad hoc networks; Network topology; Peer to peer computing; Protection; Routing protocols;
Conference_Titel :
Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on
Conference_Location :
Washington, DC
Print_ISBN :
0-7803-9465-8
DOI :
10.1109/MAHSS.2005.1542872