Robust routing in malicious environment for ad hoc networks

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the route. Availability of the network in a malicious environment has largely been ignored. In this paper, we divide the secure routing problem into two layers. The first layer provides authenticated routing and the second layer provides a route selection algorithm that selects a route with the high-est probability of successful delivery rather than the shortest route. We provide a metric for evaluating this probability. We provide simulation results that demonstrate that our approach increases the throughput by at least ten percent in a network where fifty percent of the nodes are malicious when compared to an approach that selects the shortest route. Furthermore, our approach incurs only a small delay when compared to the delay along the shortest route. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Yu, Z., Seng, C. Y., Jiang, T., Wu, X., & Arbaugh, W. A. (2005). Robust routing in malicious environment for ad hoc networks. In Lecture Notes in Computer Science (Vol. 3439, pp. 36–47). Springer Verlag. https://doi.org/10.1007/978-3-540-31979-5_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free