Risk-based routing protocol for wireless ad-hoc networks

Abdulrahman Alarifi, Wenliang Du

Research output: Chapter in Book/Entry/PoemConference contribution

Abstract

Routing in wireless ad-hoc networks is a challenging problem since wireless nodes are not necessarily known and they are vulnerable to compromise. The number of intermediate hops is not the only important factor that affects the routing; the intermediate hops themselves are also important.In this paper, we present a risk-based routing protocol for wireless ad-hoc networks. This routing protocol takes care of the risk level of using nodes as intermediate hops in addition to the number of hops. It is an adjustable protocol which can be easily adjusted to either increase or decrease how important the risk levels are. Our scheme is flexible and can be adapted, with modifications, to almost any routing protocol. We show how we can take advantage of this flexibility, using our scheme in two famous secure routing protocols: ARAN (Authenticated Routing for Ad hoc Networks), and Ariadne (a secure on-demand routing protocol for ad-hoc networks).The analysis shows that this protocol not only increases resilience anst attacks but also effectively increases the performance of the networks.

Original languageEnglish (US)
Title of host publicationProceedings of the 2005 International Conference on Wireless Networks, ICWN'05
Pages161-165
Number of pages5
StatePublished - 2005
Event2005 International Conference on Wireless Networks, ICWN'05 - Las Vegas, NV, United States
Duration: Jun 27 2005Jun 30 2005

Publication series

NameProceedings of the 2005 International Conference on Wireless Networks, ICWN'05

Other

Other2005 International Conference on Wireless Networks, ICWN'05
Country/TerritoryUnited States
CityLas Vegas, NV
Period6/27/056/30/05

Keywords

  • AODV
  • Cryptography
  • Network security
  • Risk based routing
  • Wireless sensor network

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Risk-based routing protocol for wireless ad-hoc networks'. Together they form a unique fingerprint.

Cite this