MILENA RADENKOVIC milena.radenkovic@nottingham.ac.uk
Assistant Professor
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
Radenkovic, M.; Zakhary, Sameh R.; Radenkovic, Milena
Authors
Sameh R. Zakhary
MILENA RADENKOVIC milena.radenkovic@nottingham.ac.uk
Assistant Professor
Abstract
This paper is concerned with fully distributed reputation-based mechanisms that improve security in MANETS. We introduce a number of optimisations to the current reputation schemes used in MANETs such as selective deviation tests and adaptive expiration timer that aim to deal with congestion and quick reputation convergence. We propose to use two different centrality measures for evaluation of the individual trust claims and resolving the aggregated ones. We design and build our prototype over AODV and test it in NS-2 in the presence of variable active blackhole attacks in highly mobile and sparse networks. Our results show that we achieve increased throughput while delay and jitter decrease and converge to AODV.
Citation
Radenkovic, M., Zakhary, S. R., & Radenkovic, M. (2010). Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments. In 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS) (161--167). https://doi.org/10.1109/WONS.2010.5437117
Conference Name | Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on |
---|---|
End Date | Feb 5, 2010 |
Acceptance Date | Dec 30, 2009 |
Publication Date | Feb 3, 2010 |
Deposit Date | Jun 16, 2016 |
Publicly Available Date | Jun 16, 2016 |
Peer Reviewed | Peer Reviewed |
Pages | 161--167 |
Book Title | 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS) |
DOI | https://doi.org/10.1109/WONS.2010.5437117 |
Keywords | MANET, Reputation, Trust, Routing |
Public URL | https://nottingham-repository.worktribe.com/output/706025 |
Publisher URL | http://dx.doi.org/10.1109/WONS.2010.5437117 |
Additional Information | © 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Files
wons2010.pdf
(160 Kb)
PDF
You might also like
Oceanic Eddy Identification Using Pyramid Split Attention U-Net With Remote Sensing Imagery
(2023)
Journal Article
Resistance to Cybersecurity Attacks in a Novel Network for Autonomous Vehicles
(2022)
Journal Article
Exploring user behavioral data for adaptive cybersecurity
(2019)
Journal Article