TY - JOUR
T1 - Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks
AU - Li, Jung Shian
AU - Lee, Cheng Ta
PY - 2006/5/15
Y1 - 2006/5/15
N2 - In this paper, we propose a novel routing security algorithm, called promiscuous listening routing security algorithm, for mobile hosts to detect malicious attacks in the middle, such as packet dropping or modifying. After identifying the malicious nodes, mobile hosts can isolate these nodes. The proposed algorithm is distributed and does not need any communications between hosts. It only switches on the promiscuous listening mode in hosts. Through detailed simulations, the performance of data transmission is improved by the proposed algorithm. Even only when parts of hosts employ the algorithm intermittently, the improvement is obvious.
AB - In this paper, we propose a novel routing security algorithm, called promiscuous listening routing security algorithm, for mobile hosts to detect malicious attacks in the middle, such as packet dropping or modifying. After identifying the malicious nodes, mobile hosts can isolate these nodes. The proposed algorithm is distributed and does not need any communications between hosts. It only switches on the promiscuous listening mode in hosts. Through detailed simulations, the performance of data transmission is improved by the proposed algorithm. Even only when parts of hosts employ the algorithm intermittently, the improvement is obvious.
UR - http://www.scopus.com/inward/record.url?scp=33646519702&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33646519702&partnerID=8YFLogxK
U2 - 10.1016/j.comcom.2005.06.025
DO - 10.1016/j.comcom.2005.06.025
M3 - Article
AN - SCOPUS:33646519702
SN - 0140-3664
VL - 29
SP - 1121
EP - 1132
JO - Computer Communications
JF - Computer Communications
IS - 8
ER -