Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)

Abdalla Mahmoud, Ahmed Sameh, Sherif El-Kassas
2005 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks - PE-WASUN '05  
In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is Authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail how ARAN works, criticize how an
more » ... icated misbehaving node can abuse the bandwidth and propose different solutions for this flaw in the protocol.
doi:10.1145/1089803.1089999 dblp:conf/pe-wasun/MahmoudSE05 fatcat:drpcxtdgybbnlhh4gknezrqkpa