TY - GEN
T1 - Risk-based routing protocol for wireless ad-hoc networks
AU - Alarifi, Abdulrahman
AU - Du, Wenliang
PY - 2005
Y1 - 2005
N2 - Routing in wireless ad-hoc networks is a challenging problem since wireless nodes are not necessarily known and they are vulnerable to compromise. The number of intermediate hops is not the only important factor that affects the routing; the intermediate hops themselves are also important.In this paper, we present a risk-based routing protocol for wireless ad-hoc networks. This routing protocol takes care of the risk level of using nodes as intermediate hops in addition to the number of hops. It is an adjustable protocol which can be easily adjusted to either increase or decrease how important the risk levels are. Our scheme is flexible and can be adapted, with modifications, to almost any routing protocol. We show how we can take advantage of this flexibility, using our scheme in two famous secure routing protocols: ARAN (Authenticated Routing for Ad hoc Networks), and Ariadne (a secure on-demand routing protocol for ad-hoc networks).The analysis shows that this protocol not only increases resilience anst attacks but also effectively increases the performance of the networks.
AB - Routing in wireless ad-hoc networks is a challenging problem since wireless nodes are not necessarily known and they are vulnerable to compromise. The number of intermediate hops is not the only important factor that affects the routing; the intermediate hops themselves are also important.In this paper, we present a risk-based routing protocol for wireless ad-hoc networks. This routing protocol takes care of the risk level of using nodes as intermediate hops in addition to the number of hops. It is an adjustable protocol which can be easily adjusted to either increase or decrease how important the risk levels are. Our scheme is flexible and can be adapted, with modifications, to almost any routing protocol. We show how we can take advantage of this flexibility, using our scheme in two famous secure routing protocols: ARAN (Authenticated Routing for Ad hoc Networks), and Ariadne (a secure on-demand routing protocol for ad-hoc networks).The analysis shows that this protocol not only increases resilience anst attacks but also effectively increases the performance of the networks.
KW - AODV
KW - Cryptography
KW - Network security
KW - Risk based routing
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=60749136590&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=60749136590&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:60749136590
SN - 9781932415551
T3 - Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05
SP - 161
EP - 165
BT - Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05
T2 - 2005 International Conference on Wireless Networks, ICWN'05
Y2 - 27 June 2005 through 30 June 2005
ER -