Abstract
Nodes forming mobile ad hoc networks (MANET) can be logically partitioned into 1) a selfish user agent serving the interests of the end user (owner) and 2) a selfless network agent serving the broad interests of the network. The routing tasks performed by any mobile node can then be shared between physically distinct user and network agents. The user agent could be a laptop, PDA or any such mobile network device. The network agent can be a secure co-processor in the form of a SIM card. In the interests of protecting the integrity of the network agent and keeping its cost low, it is desirable to reduce its complexity. We identify four broad classes of attacks that can be perpetrated by the user agents on resource constrained network agents, and propose low complexity strategies within the scope of network agents, to overcome such attacks and ensure the integrity of the routing protocol.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.