## Abstract Multipath routing can adapt to traffic changes, increase reliability and enhance the Quality of Service support in communication networks. This routing algorithm has been recognized as one of the salient features in Mobile __Ad hoc__ Networks (MANETs). However, existing multipath routin
Secure position-based routing protocol for mobile ad hoc networks
โ Scribed by Joo-Han Song; Vincent W.S. Wong; Victor C.M. Leung
- Publisher
- Elsevier Science
- Year
- 2007
- Tongue
- English
- Weight
- 297 KB
- Volume
- 5
- Category
- Article
- ISSN
- 1570-8705
No coin nor oath required. For personal study only.
โฆ Synopsis
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of position-based routing protocols. In this paper, we propose a secure geographic forwarding (SGF) mechanism, which provides source authentication, neighbor authentication, and message integrity by using both the shared key and the TIK protocol. By combining SGF with the Grid Location Service (GLS), we propose a Secure Grid Location Service (SGLS) where any receiver can verify the correctness of location messages. We also propose a Local Reputation System (LRS) aiming at detecting and isolating both compromised and selfish users. We present the performance analysis of both SGLS and LRS, and compare them with the original GLS. Simulation results show that SGLS can operate efficiently by using effective cryptographic mechanisms. Results also show that LRS effectively detects and isolates message dropping attackers from the network.
๐ SIMILAR VOLUMES
Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that