A secure on-demand routing with distributed authentication for trust-based ad hoc networks

Meng Yen Hsieh, Yueh Min Huang

研究成果: Conference contribution

1 引文 斯高帕斯(Scopus)

摘要

Due to node mobility, the ad hoc network topology is dynamical so that on-demand routing protocols are more fit than other routing protocols. Most secure on-demand routing protocols are designed that the destination or source is able to detect the attacks on routing paths after accepting routing requests or routing replies. In this paper, we present a secure on-demand source routing protocol without the assumption of a specific cryptographic system provides per-hop broadcast authentication in routing discovery phase and security in communication phase and takes effect on our trust-based ad hoc environment. Our hop by hop broadcast authentication provides forwarding routing packets with their trust levels for abstaining from unreliable or malicious nodes. Through security analysis and discussion, we characterize our mechanism and show that it is effectively and efficiently.

原文English
主出版物標題Network and Parallel Computing - IFIP International Conference, NPC 2005, Proceedings
頁面343-350
頁數8
DOIs
出版狀態Published - 2005 十二月 1
事件IFIP International Conference on Network and Parallel Computing, NPC 2005 - Beijing, China
持續時間: 2005 十一月 302005 十二月 3

出版系列

名字Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
3779 LNCS
ISSN(列印)0302-9743
ISSN(電子)1611-3349

Other

OtherIFIP International Conference on Network and Parallel Computing, NPC 2005
國家China
城市Beijing
期間05-11-3005-12-03

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

指紋 深入研究「A secure on-demand routing with distributed authentication for trust-based ad hoc networks」主題。共同形成了獨特的指紋。

  • 引用此

    Hsieh, M. Y., & Huang, Y. M. (2005). A secure on-demand routing with distributed authentication for trust-based ad hoc networks. 於 Network and Parallel Computing - IFIP International Conference, NPC 2005, Proceedings (頁 343-350). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 卷 3779 LNCS). https://doi.org/10.1007/11577188_49