GONG Xudong, XIONG Yan, LU Qiwei, et al., “A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 155-159, 2013,
Citation: GONG Xudong, XIONG Yan, LU Qiwei, et al., “A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 155-159, 2013,

A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics

Funds:  This work is supported by the National Natural Science Foundation of China (No.61170233, No.60970128) and China Postdoctoral Science Foundation (No.2011M501397).
  • Received Date: 2011-10-01
  • Rev Recd Date: 2011-11-01
  • Publish Date: 2013-01-05
  • Prior secure routing protocols in ad hoc networks are vulnerable under many kinds of attacks, such as wormhole attack, vertex cut attack, etc. Direct anonymous ad hoc on demand vector (DAAODV) protocol uses Direct anonymous attestation (DAA) protocol and Property based attestation (PBA) protocol to solve this problem, but its efficiency is relatively low. We propose a routing protocol called FuzzyAODV, which uses Trusted Computing technology to ensure routing security, while simplifies the secure link establishment. We also take malicious nodes into consideration, and propose a method to identify possible DoS attacks, thus adopt different strategies accordingly to keep high performance. We evaluate the performance of our protocol using NS2 network simulator, and the result shows that our protocol is more efficient than DAAODV protocol. Security analysis demonstrates the correctness of our solution.
  • loading
  • Trusted computing group. http://www.trustedcomputinggroup.org/.Accessed July 2011.
    E. Brickell, J. Camenisch and L. Chen, “Direct anonymous attestation”in Proceedings of the 11th ACM Conference on Computerand Communications Security, pp.132-145, ACM, 2004.
    L. Chen, H.L. ohr, M. Manulis and A.R. Sadeghi, “Propertybasedattestation without a trusted third party”, InformationSecurity, pp.31-46, 2008.
    J. Cordasco and S. Wetzel, “An attacker model for MANETrouting security”, in Proceedings of the Second ACM Conferenceon Wireless Network Security, pp.87-94, ACM, 2009.
    Y.C. Hu, D.B. Johnson and A. Perrig, “SEAD: Secure efficientdistance vector routing for mobile wireless ad hoc networks”,Ad Hoc Networks, Vol.1, No.1, pp.175-192, 2003.
    Y.C. Hu and A. Perrig, “A survey of secure wireless ad hocrouting”, IEEE Security and Privacy Magazine, Vol.2, pp.28-39, 2004.
    Y.C. Hu, A. Perrig and D.B. Johnson, “Ariadne: A secure ondemandrouting protocol for ad hoc networks”, Wireless Networks,Vol.11, No.1, pp.21-38, 2005.
    W. Huang, Y. Xiong and D. Chen, “DAAODV: A Secure AdHoc outing Protocol Based on direct anonymous attestation”, in2009 International Conference on Computational Science andEngineering, pp.809-816, IEEE, 2009.
    K. Sanzgiri, D. LaFlamme, B. Dahill, B.N. Levine, C. Shieldsand E.M. Belding-Royer, “Authenticated routing for ad hoc networks”,IEEE Journal on Selected Areas in Communications,Vol.23, No.3, pp.598-610, 2005.
    Agrwal Sudhir, Jain Sanjeev and Sanjeev Sharma, “A surveyof routingattacks and security measures in mobile ad hoc networks”,Journal of Computing, Vol.3, pp.41-48, 2011.
    L.A. Zadeh, “Fuzzy sets”, Information and Control, Vol.8, No.3,pp.338-353, 1965.
    M.G. Zapata and N. Asokan, “Securing ad hoc routing protocols”,in Proceedings of the 1st ACM Workshop on WirelessSecurity, pp.1-10, ACM, 2002.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (755) PDF downloads(1091) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return