IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs

Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs
View Sample PDF
Author(s): Floriano De Rango (University of Calabria, Italy)
Copyright: 2011
Pages: 17
Source title: Interdisciplinary and Multidimensional Perspectives in Telecommunications and Networking: Emerging Findings
Source Author(s)/Editor(s): Michael Bartolacci (Penn State University - Berks, USA)and Steven R. Powell (California State Polytechnic University - Pomona, USA)
DOI: 10.4018/978-1-60960-505-6.ch015

Purchase

View Trust-Based SAODV Protocol with Intrusion Detection, Trust Management and Incentive Cooperation in MANETs on the publisher's website for pricing and purchasing information.

Abstract

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.

Related Content

Raquel Sánchez Ruiz, Isabel López Cirugeda. © 2024. 22 pages.
Rocío Luque-González, Inmaculada Marín-López, Mercedes Gómez-López. © 2024. 22 pages.
Bima Sapkota, Xuwei Luo, Muna Sapkota, Murat Akarsu, Emmanuel Deogratias, Daphne Fauber, Rose Mbewe, Fidelis Mumba, Ram Krishna Panthi, Jill Newton, JoAnn Phillion. © 2024. 34 pages.
Karen Collett, Alina Slapac, Sarah A. Coppersmith, Jingxin Cheng. © 2024. 29 pages.
Maria Ines Marino, Stephanie Tadal, Nurhayat Bilge. © 2024. 25 pages.
Jaqueline Naidoo, Noah Borrero. © 2024. 19 pages.
Crystal Machado, Tami Seifert. © 2024. 20 pages.
Body Bottom