The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks

Abstract:

Article Preview

This paper introduced security threaten and familiar vulnerability in Ad Hoc networks, described security requirements for Ad Hoc routing, and for the most important, it improved an authenticated routing protocol. In this protocol, its routing messages were signed by node’s private key, thus then successfully defeated many kinds of attacks. However, there are some limitations. This paper provides a matter to improve it with higher transmission ratio and better security.

Info:

Periodical:

Edited by:

Qi Luo

Pages:

916-919

Citation:

C. D. Lu and Q. W. Li, "The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks", Applied Mechanics and Materials, Vols. 20-23, pp. 916-919, 2010

Online since:

January 2010

Export:

Price:

$38.00

[1] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer: A Secure Routing Protocol for Ad hoc �etworks, International Conferrence on Network Protocols (ICNP), (2002).

DOI: https://doi.org/10.1109/icnp.2002.1181388

[2] Aboudagga N, Refaei M T, Eltoweissy M: Authentication Protocols for Ad Hoc �etworks, Taxonomy and Research Issues[C], Proc. of ACM MSWiM'05, Canada. (2005).

[3] H. Deng and D. P. Agrawal: TIDS: threshold and identity based security scheme for wireless ad hoc networks, Ad Hoc Networks, (2004).

DOI: https://doi.org/10.1016/j.adhoc.2004.03.005