Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks

Jung Shian Li, Cheng Ta Lee

Research output: Contribution to journalArticle

15 Citations (Scopus)

Abstract

In this paper, we propose a novel routing security algorithm, called promiscuous listening routing security algorithm, for mobile hosts to detect malicious attacks in the middle, such as packet dropping or modifying. After identifying the malicious nodes, mobile hosts can isolate these nodes. The proposed algorithm is distributed and does not need any communications between hosts. It only switches on the promiscuous listening mode in hosts. Through detailed simulations, the performance of data transmission is improved by the proposed algorithm. Even only when parts of hosts employ the algorithm intermittently, the improvement is obvious.

Original languageEnglish
Pages (from-to)1121-1132
Number of pages12
JournalComputer Communications
Volume29
Issue number8
DOIs
Publication statusPublished - 2006 May 15

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks'. Together they form a unique fingerprint.

  • Cite this