• DocumentCode
    915586
  • Title

    Performance comparison of trust-based reactive routing protocols

  • Author

    Pirzada, Asad Amir ; McDonald, Chris ; Datta, Amitava

  • Author_Institution
    Sch. of Comput. Sci. & Software Eng., The Univ. of Western Australia, Crawley, WA, Australia
  • Volume
    5
  • Issue
    6
  • fYear
    2006
  • fDate
    6/1/2006 12:00:00 AM
  • Firstpage
    695
  • Lastpage
    710
  • Abstract
    Ad hoc networks, due to their improvised nature, are frequently established in insecure environments and hence become susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. A number of secure routing protocols have recently been proposed, which make use of cryptographic algorithms to secure the routes. However, in doing so, these protocols entail a number of prerequisites during both the network establishment and operation phases. In contrast, trust-based routing protocols locate trusted rather than secure routes in the network by observing the sincerity in participation by other nodes. These protocols thus permit rapid deployment along with a dynamically adaptive operation, which conforms with the current network situation. In this paper, we evaluate the performance of three trust-based reactive routing protocols in a network with varying number of malicious nodes. With the help of exhaustive simulations, we demonstrate that the performance of the three protocols varies significantly even under similar attack, traffic, and mobility conditions. However, each trust-based routing protocol has its own peculiar advantage making it suitable for application in a particular extemporized environment.
  • Keywords
    ad hoc networks; cryptography; mobile radio; routing protocols; telecommunication security; cryptographic algorithms; mobile ad hoc networks; network establishment; operation phases; trust-based reactive routing protocols; Ad hoc networks; Cryptographic protocols; Cryptography; Hardware; Network topology; Protection; Routing protocols; Telecommunication traffic; Traffic control; Wireless networks; Trust; ad hoc; network; protocol.; security;
  • fLanguage
    English
  • Journal_Title
    Mobile Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1536-1233
  • Type

    jour

  • DOI
    10.1109/TMC.2006.83
  • Filename
    1624341