Paper Title:
The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks
  Abstract

This paper introduced security threaten and familiar vulnerability in Ad Hoc networks, described security requirements for Ad Hoc routing, and for the most important, it improved an authenticated routing protocol. In this protocol, its routing messages were signed by node’s private key, thus then successfully defeated many kinds of attacks. However, there are some limitations. This paper provides a matter to improve it with higher transmission ratio and better security.

  Info
Periodical
Edited by
Qi Luo
Pages
916-919
DOI
10.4028/www.scientific.net/AMM.20-23.916
Citation
C. D. Lu, Q. W. Li, "The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks", Applied Mechanics and Materials, Vols. 20-23, pp. 916-919, 2010
Online since
January 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xiao Yun Chen, Yu Kai Yao, Guo Hua Liu, Long Jie Li
Abstract:Mobile Ad hoc Network (MANET) has attracted lots of research efforts these years, mainly due to its appealing applications in no...
457
Authors: Rong Guo Li
Abstract:In this paper, we elaborated on preventive mechanisms either based on cryptographic solutions or trust based infrastructure Moreover, both...
1451
Authors: Hai Yan Zhao, Jun Qiang Yang, Hui Li
X. Communications and Information Technology Applications
Abstract:Ad Hoc network is a special kind of mobile multi-hop wireless networks, which has been widely used various occasions. In this paper, the main...
2006
Authors: Jian Xu
Chapter 7: Communication and Information Technology
Abstract:An energy-aware and congestion-avoidance routing protocol for mobile Ad Hoc network is proposed in this paper. The protocol modifies RREQ of...
727