p.894
p.898
p.905
p.910
p.916
p.920
p.926
p.931
p.936
The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks
Abstract:
This paper introduced security threaten and familiar vulnerability in Ad Hoc networks, described security requirements for Ad Hoc routing, and for the most important, it improved an authenticated routing protocol. In this protocol, its routing messages were signed by node’s private key, thus then successfully defeated many kinds of attacks. However, there are some limitations. This paper provides a matter to improve it with higher transmission ratio and better security.
Info:
Periodical:
Pages:
916-919
Citation:
Online since:
January 2010
Authors:
Keywords:
Price:
Сopyright:
© 2010 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: