A secure on-demand routing with distributed authentication for trust-based ad hoc networks

Meng Yen Hsieh, Yueh Min Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Due to node mobility, the ad hoc network topology is dynamical so that on-demand routing protocols are more fit than other routing protocols. Most secure on-demand routing protocols are designed that the destination or source is able to detect the attacks on routing paths after accepting routing requests or routing replies. In this paper, we present a secure on-demand source routing protocol without the assumption of a specific cryptographic system provides per-hop broadcast authentication in routing discovery phase and security in communication phase and takes effect on our trust-based ad hoc environment. Our hop by hop broadcast authentication provides forwarding routing packets with their trust levels for abstaining from unreliable or malicious nodes. Through security analysis and discussion, we characterize our mechanism and show that it is effectively and efficiently.

Original languageEnglish
Title of host publicationNetwork and Parallel Computing - IFIP International Conference, NPC 2005, Proceedings
Pages343-350
Number of pages8
DOIs
Publication statusPublished - 2005
EventIFIP International Conference on Network and Parallel Computing, NPC 2005 - Beijing, China
Duration: 2005 Nov 302005 Dec 3

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3779 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherIFIP International Conference on Network and Parallel Computing, NPC 2005
Country/TerritoryChina
CityBeijing
Period05-11-3005-12-03

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A secure on-demand routing with distributed authentication for trust-based ad hoc networks'. Together they form a unique fingerprint.

Cite this