Security and Reputation Schemes in Ad-hoc Networks Routing
نویسنده
چکیده
Ad hoc networks have vital problem concerning their security aspects. These must be solved in order to realize complete Ad hoc applications. The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. There are recent research efforts in securing ad hoc networks. Amongst security approaches, there are threshold cryptography, certification authority, reputation and authentication, in this paper an introduction and survey of these approaches have been presented.
منابع مشابه
Using Social Network Theory Towards Development of Wireless Ad hoc Network
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been recently used in the domain of wireless ad hoc networks. It has been shown that these schemes provide positive results as a self-policing mechanism for the routing of data in wireless ad hoc network security. This paper ...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملA Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks
In recent years huge potential benefits from novel applications in mobile ad hoc networks (MANET) have been discussed extensively. However, without robust security mechanisms and systems to provide safety shell through the MANET infrastructure, MANET applications can be vulnerable and hammered by malicious attackers easily. In order to detect misbehaved message routing and identify malicious at...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملReputation Methods for Routing Security for Mobile Ad Hoc Networks*
Mobile ad hoc networks have inherently very different properties to conventional networks. These new characteristics present major security vulnerabilities; in particular, one side effect of the unique way in which routing protocols operate in ad hoc networks is that many new threats arise. Selfish nodes are those which do not perform certain operations that the protocol specifies that they sho...
متن کامل