Title :
Performance comparison of trust-based reactive routing protocols
Author :
Pirzada, Asad Amir ; McDonald, Chris ; Datta, Amitava
Author_Institution :
Sch. of Comput. Sci. & Software Eng., The Univ. of Western Australia, Crawley, WA, Australia
fDate :
6/1/2006 12:00:00 AM
Abstract :
Ad hoc networks, due to their improvised nature, are frequently established in insecure environments and hence become susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. A number of secure routing protocols have recently been proposed, which make use of cryptographic algorithms to secure the routes. However, in doing so, these protocols entail a number of prerequisites during both the network establishment and operation phases. In contrast, trust-based routing protocols locate trusted rather than secure routes in the network by observing the sincerity in participation by other nodes. These protocols thus permit rapid deployment along with a dynamically adaptive operation, which conforms with the current network situation. In this paper, we evaluate the performance of three trust-based reactive routing protocols in a network with varying number of malicious nodes. With the help of exhaustive simulations, we demonstrate that the performance of the three protocols varies significantly even under similar attack, traffic, and mobility conditions. However, each trust-based routing protocol has its own peculiar advantage making it suitable for application in a particular extemporized environment.
Keywords :
ad hoc networks; cryptography; mobile radio; routing protocols; telecommunication security; cryptographic algorithms; mobile ad hoc networks; network establishment; operation phases; trust-based reactive routing protocols; Ad hoc networks; Cryptographic protocols; Cryptography; Hardware; Network topology; Protection; Routing protocols; Telecommunication traffic; Traffic control; Wireless networks; Trust; ad hoc; network; protocol.; security;
Journal_Title :
Mobile Computing, IEEE Transactions on
DOI :
10.1109/TMC.2006.83