SR3: secure resilient reputation-based routing
نویسندگان
چکیده
منابع مشابه
SR3: A Secure and Resilient Reputation-Based Routing Protocol
We propose SR3, a secure and resilient algorithm for convergecast routing in WSNs. SR3 uses lightweight cryptographic primitives to achieve data confidentiality and data packet unforgeability. SR3 has a security proven by formal tool. We made simulations to show the resiliency of SR3 against various scenarios, where we mixed selective forwarding, blackhole, wormhole, and Sybil attacks. We compa...
متن کاملSecure and Resilient Routing: A Framework for Resilient Network Architectures
A common paradigm for a network service architecture is to provide a number of different services or applications in which all of them share resources; the routing framework provides the best path to all services. A simple twist to this basic notion is if we were to architect in a way to virtualize the network so that different services are clustered into different virtual, adaptive partitions ...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملA Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks
With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit o...
متن کاملA Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nodes could greatly degrade the network performance and might even result in a total communication breakdown. However, the majority of ad hoc networks secure routing protocols assumed that all nodes participating in the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Networks
سال: 2016
ISSN: 1022-0038,1572-8196
DOI: 10.1007/s11276-016-1273-4