The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks

Abstract:

Article Preview

This paper introduced security threaten and familiar vulnerability in Ad Hoc networks, described security requirements for Ad Hoc routing, and for the most important, it improved an authenticated routing protocol. In this protocol, its routing messages were signed by node’s private key, thus then successfully defeated many kinds of attacks. However, there are some limitations. This paper provides a matter to improve it with higher transmission ratio and better security.

Info:

Periodical:

Edited by:

Qi Luo

Pages:

916-919

DOI:

10.4028/www.scientific.net/AMM.20-23.916

Citation:

C. D. Lu and Q. W. Li, "The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks", Applied Mechanics and Materials, Vols. 20-23, pp. 916-919, 2010

Online since:

January 2010

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.