Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
158 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks (0911.0503v1)

Published 3 Nov 2009 in cs.CR

Abstract: In this paper, we develop a trust based security protocol based on a cross layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious. In the next phase of the protocol, we provide link layer security using the CBCX mode of authentication and encryption. By simulation results, we show that the proposed cross layer security protocol achieves high packet delivery ratio while attaining low delay and overhead.

Citations (43)

Summary

We haven't generated a summary for this paper yet.