2015 Wireless Telecommunications Symposium (WTS) 2015
DOI: 10.1109/wts.2015.7117288
|View full text |Cite
|
Sign up to set email alerts
|

Energy consumption evaluation of SAODV with trust management scheme under gray-hole attacks

Abstract: Mobile ad-hoc networks allow communication between mobile nodes without the existence of an infrastructure, so they are adaptable also in hostile environments. Using the wireless communication leads to a lack of security. Due to the characteristics of mobile nodes, they have batteries as power source, so their energy is constrained. A routing protocol for MANETs has to take into account this constraint, limiting the amount of used energy. Introducing security measures to protect the network against malicious n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Despite the increased consumption due to the execution of monitoring activities, the MANETs are subject to many types of attacks, so an unprotected network cannot guarantee the fair execution of the routing operations. In previous works [12], [13], [14], the results of many simulations under different network conditions show that the percentage of energy consumed for monitoring activities in MANETs is at least the 28% of the overall consumption due to the wireless interface, reaching the 41% in the worst case. The main aim of this proposal is the reduction of the monitoring operations without undermine the intrusion detection effectiveness.…”
Section: Proposalmentioning
confidence: 87%
See 2 more Smart Citations
“…Despite the increased consumption due to the execution of monitoring activities, the MANETs are subject to many types of attacks, so an unprotected network cannot guarantee the fair execution of the routing operations. In previous works [12], [13], [14], the results of many simulations under different network conditions show that the percentage of energy consumed for monitoring activities in MANETs is at least the 28% of the overall consumption due to the wireless interface, reaching the 41% in the worst case. The main aim of this proposal is the reduction of the monitoring operations without undermine the intrusion detection effectiveness.…”
Section: Proposalmentioning
confidence: 87%
“…In [11] a trust-based Secure AODV is proposed, using incentive cooperation and an intrusion detection mechanism to penalize selfish nodes. Differently from these proposals, our previous works in [12], [13], [14] takes into account both the reliability of the routes and the energy consumed to monitor the nodes behavior. The proposal is implemented on the well-known Secure AODV protocol through a Trust Management Scheme (TMS), achieving a reliable communication between the nodes in the network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…An energy-aware routing protocol that takes also into account the link stability was proposed for distributed wireless networks. 18 In our previous works [19][20][21] we analyze the route reliability and the total energy consumption due to transmission and monitoring activities. We developed our proposal on the Secure AODV protocol, which offers protection against attacks concerning impersonation and route disruption using the cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Our previous works in Ref. [19][20][21] analyze the results of many simulations under different network conditions, showing that the percentage of energy consumed for monitoring activities in MANETs is included between the 28% and the 41% of the wireless interface consumption.…”
Section: Proposalmentioning
confidence: 99%