{"title":"使用AODV协议的可靠路由","authors":"A. Pirzada, A. Datta, C. McDonald","doi":"10.1109/INCC.2004.1366570","DOIUrl":null,"url":null,"abstract":"Ad-hoc networks come into existence when two or more wireless mobile nodes agree to pass packets for each other. The wireless range of these nodes is usually limited to hundred of meters; however, with mutual cooperation these nodes are able to provide extended communication coverage. Ad-hoc on-demand distance vector (AODV) is a routing protocol frequently used to establish such networks. The correct execution of the protocol requires sustained benevolent behaviour by all participating nodes. This is difficult to achieve and malicious nodes frequently tamper with the AODV routing process. We propose a novel and pragmatic method for establishing trustworthy routes in an AODV based ad-hoc network without necessitating the use of cryptography. We accentuate that our model is most appropriate for ad-hoc networks that can be established on the fly without requiring a dedicated trust infrastructure or pre-configuration of nodes.","PeriodicalId":337263,"journal":{"name":"2004 International Networking and Communication Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Trustworthy routing with the AODV protocol\",\"authors\":\"A. Pirzada, A. Datta, C. McDonald\",\"doi\":\"10.1109/INCC.2004.1366570\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad-hoc networks come into existence when two or more wireless mobile nodes agree to pass packets for each other. The wireless range of these nodes is usually limited to hundred of meters; however, with mutual cooperation these nodes are able to provide extended communication coverage. Ad-hoc on-demand distance vector (AODV) is a routing protocol frequently used to establish such networks. The correct execution of the protocol requires sustained benevolent behaviour by all participating nodes. This is difficult to achieve and malicious nodes frequently tamper with the AODV routing process. We propose a novel and pragmatic method for establishing trustworthy routes in an AODV based ad-hoc network without necessitating the use of cryptography. We accentuate that our model is most appropriate for ad-hoc networks that can be established on the fly without requiring a dedicated trust infrastructure or pre-configuration of nodes.\",\"PeriodicalId\":337263,\"journal\":{\"name\":\"2004 International Networking and Communication Conference\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-06-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2004 International Networking and Communication Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCC.2004.1366570\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2004 International Networking and Communication Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCC.2004.1366570","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ad-hoc networks come into existence when two or more wireless mobile nodes agree to pass packets for each other. The wireless range of these nodes is usually limited to hundred of meters; however, with mutual cooperation these nodes are able to provide extended communication coverage. Ad-hoc on-demand distance vector (AODV) is a routing protocol frequently used to establish such networks. The correct execution of the protocol requires sustained benevolent behaviour by all participating nodes. This is difficult to achieve and malicious nodes frequently tamper with the AODV routing process. We propose a novel and pragmatic method for establishing trustworthy routes in an AODV based ad-hoc network without necessitating the use of cryptography. We accentuate that our model is most appropriate for ad-hoc networks that can be established on the fly without requiring a dedicated trust infrastructure or pre-configuration of nodes.