Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks 2005
DOI: 10.1145/1089803.1089999
|View full text |Cite
|
Sign up to set email alerts
|

Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)

Abstract: In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail how ARAN works, criticize how an authenticated misbehav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
10
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…This protocol is based on the basic operation of the DSR protocol. In [9], a secure routing protocol based on DSDV has been proposed. Hash chains have been used to authenticate hop counts and sequence numbers.…”
Section: Literature Survey:-mentioning
confidence: 99%
“…This protocol is based on the basic operation of the DSR protocol. In [9], a secure routing protocol based on DSDV has been proposed. Hash chains have been used to authenticate hop counts and sequence numbers.…”
Section: Literature Survey:-mentioning
confidence: 99%
“…MANETS have several advantages over traditional wired networks as they are easy to deploy in a short interval of time and are independent of fixed infrastructure. Nodes in MANET can behave differently in the network as at one time a node can behave as a sender; other time as the receiver and can also help to route the packets to another nodes functioning as the router [9]. Nodes communicate to each other with the help of their transmission ranges and routing protocols defines the rules for communication.…”
Section: Introductionmentioning
confidence: 99%
“…Nodes communicate to each other with the help of their transmission ranges and routing protocols defines the rules for communication. As discussed in [7], [9] these protocols come under different categories like-…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…So, a reputation based scheme called reputed-aran [14] was proposed to detect and defend against selfish nodes.…”
mentioning
confidence: 99%