دورية أكاديمية

RARAN: Authenticated Routing for Ad Hoc Networks Protocol with Reputation.

التفاصيل البيبلوغرافية
العنوان: RARAN: Authenticated Routing for Ad Hoc Networks Protocol with Reputation.
المؤلفون: Sameh, A., Mahmoud, A., El-Kassas, S.
المصدر: International Review on Computers & Software; Sep2007, Vol. 2 Issue 5, p463-474, 12p, 4 Diagrams, 4 Charts, 3 Graphs
مصطلحات موضوعية: ROUTING (Computer network management), AD hoc computer networks, COMPUTER security, COMPUTER network management, DATA protection
مستخلص: The field of MANETs is rapidly growing and changing. While there are still many challenges that need to be met, it is likely that such networks will see widespread use within the next few years. One of these challenges is security. Security of mobile ad hoc networks has recently gained momentum in the research community. Due to the open nature of ad hoc networks and their inherent lack of infrastructure, security exposures can be an impediment to basic network operation and countermeasures should be included in network functions from the early stages of their design. In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail the security attacks that the ARAN protocol defends against, criticize how an authenticated selfish node can disturb the network by dropping packets or by not cooperating in the routing functionality and propose a reputation-based scheme called Reputed-ARAN to detect and defend against selfish nodes. The solution presented in this thesis only covers a subset of all threats and is far from providing a comprehensive answer to the many security problems in the MANETs field. [ABSTRACT FROM AUTHOR]
Copyright of International Review on Computers & Software is the property of Praise Worthy Prize S.r.L. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index