TY - GEN
T1 - TRAS
T2 - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
AU - Jawhar, Imad
AU - Mohammed, Farhan
AU - Jaroodi, Jameela Al
AU - Mohamed, Nader
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/6/30
Y1 - 2016/6/30
N2 - Routing protocols in mobile ad hoc and sensor networks discover usable multi-hop routes between source and destination nodes. However, some of the routes found and used may not be as reliable or trustable as expected. Thus, finding a trusted route is an important component for enhancing the security of communication. This paper presents a trust-based routing protocol for enhanced security of communication in mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). Enhanced trust and security are achieved by the maintenance of a trust factor by the nodes in the network. This factor is established and refined over time and it increases for each node when it participates successfully in data transmissions. Simulation experiments are performed to verify the operation of the proposed protocol and evaluate its performance. The results show an improvement in the trust potential of the discovered path with the proper choice of certain important trust parameters.
AB - Routing protocols in mobile ad hoc and sensor networks discover usable multi-hop routes between source and destination nodes. However, some of the routes found and used may not be as reliable or trustable as expected. Thus, finding a trusted route is an important component for enhancing the security of communication. This paper presents a trust-based routing protocol for enhanced security of communication in mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). Enhanced trust and security are achieved by the maintenance of a trust factor by the nodes in the network. This factor is established and refined over time and it increases for each node when it participates successfully in data transmissions. Simulation experiments are performed to verify the operation of the proposed protocol and evaluate its performance. The results show an improvement in the trust potential of the discovered path with the proper choice of certain important trust parameters.
KW - Wireless network
KW - mobile ad hoc network (MANET)
KW - quality of service (QoS)
KW - routing protocol
KW - trust
KW - wireless sensor network (WSN)
UR - http://www.scopus.com/inward/record.url?scp=84979738770&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84979738770&partnerID=8YFLogxK
U2 - 10.1109/BigDataSecurity-HPSC-IDS.2016.58
DO - 10.1109/BigDataSecurity-HPSC-IDS.2016.58
M3 - Conference contribution
AN - SCOPUS:84979738770
T3 - Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
SP - 382
EP - 387
BT - Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016
A2 - Qiu, Meikang
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 9 April 2016 through 10 April 2016
ER -