Li, F., Al-Sherbaz, A., Jassim, S. and Adams, C. (2008) Credibility based secure route finding in wireless ad hoc networks. In: Agaian, S. S. and Jassim, S. (eds.) Mobile Multimedia/Image Processing, Security, and Applications 2008. Orlando, Florida, USA: Society of Photo Optical Instrumentation Engineers (SPIE). 9780819471734. [Proceedings of SPIE; Vol. 6982]
Item Type: | Conference Proceedings |
---|---|
Abstract: | Existing Ad Hoc routing protocols are mostly based on efficiency-driven protocols. Malicious nodes can easily impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping or black hole attacks without being detected. It is virtually impossible to find out these kinds of malicious before they attack, therefore it would be sensible to base detection of malicious nodes on post route discovery stage, i.e. when packets are transmitted on discovered routes. In this paper we shall review existing techniques for secure routing and propose to use credibility based route finding protocols. Each node would monitor its neighbors' pattern of delivering packets and regularly update their "credibility" according to certain criteria. The level of trust in any route will be based on the credits associated with the neighbor belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks. We will discuss problems we encountered and our solutions. We would also further develop the protocol, to investigate the possibility of using the unique prime factorization theory to enable nodes acquiring more trust knowledge beyond its immediate neighborhood. Such an approach helps to further secure route-finding procedures |
Subjects: | T Technology > TK Electrical engineering. Electronics. Nuclear engineering > TK5101 Telecommunication > TK5103.2 Wireless communication systems |
Creators: | Li, Fanzhi, Al-Sherbaz, Ali, Jassim, Sabah and Adams, Chris |
Editors: | Agaian, Sos S and Jassim, Sabah |
Publisher: | Society of Photo Optical Instrumentation Engineers (SPIE) |
Faculties, Divisions and Institutes: |
University Faculties, Divisions and Research Centres - OLD > School of Applied Sciences (to 2009) > Engineering (to 2009) Faculties > Faculty of Arts, Science & Technology > Engineering |
Date: | 19 March 2008 |
Date Type: | Publication |
Title of Book: | Mobile Multimedia/Image Processing, Security, and Applications 2008 |
Event Title: | Mobile Multimedia/Image Processing, Security, and Applications 2008 |
Event Dates: | 19 March 2008 |
Place of Publication: | Orlando, Florida, USA |
Event Location: | Orlando, Florida, USA |
Event Type: | Conference |
Number of Pages: | 376 |
Language: | English |
ISBN: | 9780819471734 |
DOI: | https://doi.org/10.1117/12.777589 |
Status: | Published / Disseminated |
Refereed: | Yes |
Related URLs: | |
URI: | http://nectar.northampton.ac.uk/id/eprint/4238 |
Actions (login required)
Edit Item |
Altmetric