The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks

Article Preview

Abstract:

This paper introduced security threaten and familiar vulnerability in Ad Hoc networks, described security requirements for Ad Hoc routing, and for the most important, it improved an authenticated routing protocol. In this protocol, its routing messages were signed by node’s private key, thus then successfully defeated many kinds of attacks. However, there are some limitations. This paper provides a matter to improve it with higher transmission ratio and better security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

916-919

Citation:

Online since:

January 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer: A Secure Routing Protocol for Ad hoc �etworks, International Conferrence on Network Protocols (ICNP), (2002).

DOI: 10.1109/icnp.2002.1181388

Google Scholar

[2] Aboudagga N, Refaei M T, Eltoweissy M: Authentication Protocols for Ad Hoc �etworks, Taxonomy and Research Issues[C], Proc. of ACM MSWiM'05, Canada. (2005).

DOI: 10.1145/1089761.1089777

Google Scholar

[3] H. Deng and D. P. Agrawal: TIDS: threshold and identity based security scheme for wireless ad hoc networks, Ad Hoc Networks, (2004).

DOI: 10.1016/j.adhoc.2004.03.005

Google Scholar