Northampton Electronic Collection of Theses and Research

Credibility based secure route finding in wireless ad hoc networks

Li, F., Al-Sherbaz, A., Jassim, S. and Adams, C. (2008) Credibility based secure route finding in wireless ad hoc networks. In: Agaian, S. S. and Jassim, S. (eds.) Agaian, Sos S and Jassim, Sabah Mobile Multimedia/Image Processing, Security, and Applications 2008. Orlando, Florida, USA: Society of Photo Optical Instrumentation Engineers (SPIE). 9780819471734. [Proceedings of SPIE; Vol. 6982]

Item Type: Conference Proceedings
Abstract: Existing Ad Hoc routing protocols are mostly based on efficiency-driven protocols. Malicious nodes can easily impair the performance of wireless ad hoc networks as a result of different actions such as packet dropping or black hole attacks without being detected. It is virtually impossible to find out these kinds of malicious before they attack, therefore it would be sensible to base detection of malicious nodes on post route discovery stage, i.e. when packets are transmitted on discovered routes. In this paper we shall review existing techniques for secure routing and propose to use credibility based route finding protocols. Each node would monitor its neighbors' pattern of delivering packets and regularly update their "credibility" according to certain criteria. The level of trust in any route will be based on the credits associated with the neighbor belonging to the discovered route. We shall evaluate the performance of the proposed scheme by modifying our simulation system so that each node has a dynamic changing "credit list" for its neighbors' behavior. We shall conduct a series of simulations with and without the proposed scheme and compare the results. We will demonstrate that the proposed mechanism is capable of isolating malicious nodes and thereby counteracting black hole attacks. We will discuss problems we encountered and our solutions. We would also further develop the protocol, to investigate the possibility of using the unique prime factorization theory to enable nodes acquiring more trust knowledge beyond its immediate neighborhood. Such an approach helps to further secure route-finding procedures
Subjects: T Technology > TK Electrical engineering. Electronics. Nuclear engineering > TK5101 Telecommunication > TK5103.2 Wireless communication systems
Creators: Li, Fanzhi, Al-Sherbaz, Ali, Jassim, Sabah and Adams, Chris
Editors: Agaian, Sos S and Jassim, Sabah
Publisher: Society of Photo Optical Instrumentation Engineers (SPIE)
Faculties, Divisions and Institutes: University Faculties, Divisions and Research Centres - OLD > School of Applied Sciences (to 2009) > Engineering (to 2009)
Faculties > Faculty of Arts, Science & Technology > Engineering
Date: 19 March 2008
Date Type: Publication
Title of Book: Mobile Multimedia/Image Processing, Security, and Applications 2008
Event Title: Mobile Multimedia/Image Processing, Security, and Applications 2008
Event Dates: 19 March 2008
Place of Publication: Orlando, Florida, USA
Event Location: Orlando, Florida, USA
Event Type: Conference
Number of Pages: 376
Language: English
ISBN: 9780819471734
DOI: https://doi.org/10.1117/12.777589
Status: Published / Disseminated
Refereed: Yes
Related URLs:
URI: http://nectar.northampton.ac.uk/id/eprint/4238

Actions (login required)

Edit Item Edit Item