Title :
Routing Attacks and Solutions in Mobile Ad hoc Networks
Author :
Peng, Geng ; Chuanyun, Zou
Author_Institution :
Dept. of Telecommun. & Inf. Eng., Guilin Univ., Guilin
Abstract :
On the basis of introducing the basic conception of mobile ad hoc network, this paper discusses some types of possible security threats to its routing protocols. A security routing mechanism based on common neighbor listening is proposed. In this mechanism, the trustvalue and trustthreshold are defined to evaluate a node´s credit standing and judge whether a node is a malicious node or not. The common neighbor which holds the biggest trustvalue is chosen to listen to the network. The mechanism can react quickly and effectively protect the network from kinds of attacks when some malicious nodes occur in the ad hoc network. Once the route is destroyed by malicious node, common neighbor will search another route to the destination during a route discovery phase. The mechanism can reinforce the security of on-demand protocols such as AODV (ad hoc on-demand distance vector) and DSR (dynamic source routing). The performance of common neighbor listening mechanism in AODV is justified by computer simulation.
Keywords :
ad hoc networks; mobile radio; routing protocols; telecommunication security; common neighbor listening mechanism; computer simulation; credit standing; malicious node; mobile ad hoc networks; routing protocols; security threats; trustthreshold; trustvalue; Ad hoc networks; Bandwidth; Computer crime; Data security; Information security; Mobile ad hoc networks; National security; Protection; Routing protocols; Telecommunication traffic;
Conference_Titel :
Communication Technology, 2006. ICCT '06. International Conference on
Conference_Location :
Guilin
Print_ISBN :
1-4244-0800-8
Electronic_ISBN :
1-4244-0801-6
DOI :
10.1109/ICCT.2006.341678