Authenticated Routing Protocol Based on Reputation System For Adhoc Networks

  title={Authenticated Routing Protocol Based on Reputation System For Adhoc Networks},
  author={Preeti Nagrath and Ashish Kumar and Shikha Bhardwaj},
Dynamic nature of adhoc networks leads to challenges in securing the network. Due to vulnerable nature of adhoc networks there are many security threats. Much work is going on to provide security to the network. One of the solution to the problem is ARAN – Authenticated routing protocol which is a secure protocol and provides Integrity, Availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications referenced by this paper.
Showing 1-10 of 13 references

Attack Trees: Modeling security threats

B. Schneier
Dr Dobb’s Journal, • 1999
View 4 Excerpts
Highly Influenced

ReputedAuthenticated Routing for Ad Hoc Networks ProtocolA Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks

A Mahmoud, A Sameh, S. El-Kassas

Buchegger and J . Le Boudec . A Robust Reputation System for P 2 P and Mobile Ad - hoc Networks

T. Giuli Marti, K. Lai, M. Baker
Proceedings of the Second Workshop on the Economics of Peer - to - Peer Systems , June • 2004

Similar Papers

Loading similar papers…