{"title":"Reputation Routing in MANETs","authors":"P. Singh, K. Kar, C. Kamhoua","doi":"10.1109/VTCFall.2017.8288226","DOIUrl":null,"url":null,"abstract":"In this work we present a trust computation method, Direct Trust Computation, and utilize it to design a Reputation Routing Model (RRM) for MANETs. We utilize this routing framework to mitigate the effect of blackhole attacks in OLSR without altering the original protocol or increasing its overhead. Our solution can isolate bad nodes in the network and select the most trusted path to route packets. We evaluate the performance of our model by emulating network scenarios on Common Open Research Emulator (CORE) for static as well as dynamic topologies. From our findings, it is observed that RRM substantially outperforms the original OLSR protocol in terms of packet delivery rates in presence of a malicious node, unless the mobility rate is quite high. RRM is therefore useful in mitigating the effect of blackhole attacks in MANETs, particularly in low mobility scenarios.","PeriodicalId":375803,"journal":{"name":"2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VTCFall.2017.8288226","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this work we present a trust computation method, Direct Trust Computation, and utilize it to design a Reputation Routing Model (RRM) for MANETs. We utilize this routing framework to mitigate the effect of blackhole attacks in OLSR without altering the original protocol or increasing its overhead. Our solution can isolate bad nodes in the network and select the most trusted path to route packets. We evaluate the performance of our model by emulating network scenarios on Common Open Research Emulator (CORE) for static as well as dynamic topologies. From our findings, it is observed that RRM substantially outperforms the original OLSR protocol in terms of packet delivery rates in presence of a malicious node, unless the mobility rate is quite high. RRM is therefore useful in mitigating the effect of blackhole attacks in MANETs, particularly in low mobility scenarios.