Abstract | ||
---|---|---|
In a mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Rather, they have to cooperate to achieve this objective. However, the absence of any trusted third party in such networks may result in nodes deviating from the routing protocol for selfish or malicious reasons. The concept of trusted routing has been promoted to handle the problems selfish and malicious nodes cause to the network. In this paper, we focus on using trust in routing, and show how trust can mitigate against malicious behaviour. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-540-85257-5_11 | Studies in Computational Intelligence |
Keywords | Field | DocType |
routing protocol,trusted third party,mobile ad hoc network | Link-state routing protocol,Dynamic Source Routing,Static routing,Computer science,Computer security,Policy-based routing,Computer network,Destination-Sequenced Distance Vector routing,Wireless Routing Protocol,Optimized Link State Routing Protocol,Routing protocol | Conference |
Volume | ISSN | Citations |
162.0 | 1860-949X | 12 |
PageRank | References | Authors |
0.82 | 13 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Nathan Griffiths | 1 | 388 | 34.25 |
Arshad Jhumka | 2 | 361 | 31.79 |
Anthony Dawson | 3 | 12 | 0.82 |
Richard Myers | 4 | 12 | 0.82 |