Sciweavers

CNSR
2004
IEEE

Trusted Route Discovery with TORA Protocol

14 years 4 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TORA) is one of the commonly used protocols for ad-hoc wireless networks. Route discovery in TORA is done in a cooperative manner with intermediate nodes contributing to the route generation. Precision in route build-up demands that all network nodes portray persistent benevolent behavior. This is however, not always possible to achieve and so a number of malicious nodes participate in the TORA route discovery process only to sabotage the network by violating the protocol. In this paper we present a novel mechanism for establishing trust in ad-hoc networks that execute the Temporally Ordered Routing Algorithm (TORA) Protocol. The routes discovered using our model are not cryptographically secure but each one of them carries a confidence measure regarding its suitability in the current scenario.
Asad Amir Pirzada, Chris McDonald
Added 20 Aug 2010
Updated 20 Aug 2010
Type Conference
Year 2004
Where CNSR
Authors Asad Amir Pirzada, Chris McDonald
Comments (0)