IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs

Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs
View Sample PDF
Author(s): Floriano De Rango (University of Calabria, Rende, Italy)
Copyright: 2010
Pages: 18
Source title: Networking and Telecommunications: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-60566-986-1.ch097

Purchase

View Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs on the publisher's website for pricing and purchasing information.

Abstract

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.

Related Content

S. Vijay Anand, Sathis Kumar B.. © 2023. 12 pages.
Sudarson Rama Perumal, Muthumanikandan V., Sushmitha J.. © 2023. 30 pages.
Sipra Swain, Biswa Ranjan Senapati, Pabitra Mohan Khilar. © 2023. 31 pages.
Uma Mageswari R., Nallarasu Krishnan, Mohammed Sirajudeen Yoosuf, Murugan K., Sankar Ram C.. © 2023. 20 pages.
Divya L., Pradeep Kumar T. S.. © 2023. 15 pages.
Pradeep Kumar T. S., Vetrivelan P.. © 2023. 15 pages.
Vanitha Veerasamy, Rajathi Natarajan. © 2023. 16 pages.
Body Bottom