18.3 ASSUMPTIONS AND TERMINOLOGIES

SMRTI enhances the security of network layer and hence like related reputation and trust models [1416], it relies on secure routing protocols [15] to authenticate intermediate nodes. Jamming attacks are beyond the scope of this chapter; however, mechanisms such as spread spectrum or routing around jammed area [19] can be deployed to defend against such attacks. Similar to related reputation and trust models [7, 1012, 15, 16], SMRTI captures evidence for modification attacks such as addition or deletion of nodes in a path, and unauthorized increment of the route request's sequence number through passive monitoring. It relies on cooperation-based fellowship model [20, 21] to defend against denial of service (DoS) attacks such as packet drop and flooding attacks.

We refer to the malicious actions performed by internal attackers as misbehaviors or malicious behaviors. On the other hand, a benign node's actions that confirm to the basic routing operations are known as normal or benign behaviors. We refer to one-hop nodes as neighbors and a node's wireless transmission range as its environment. For ease of explanation, we define the sequence of successful route discovery followed by data flow as communication flow. In general, route request (RREQ), route reply (RREP), and route error (RERR) phase of route discovery cycle and data flow are referred as events. We use the terminologies, path and route, interchangeably throughout the paper and they refer ...

Get Mobile Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.