The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks
This paper introduced security threaten and familiar vulnerability in Ad Hoc networks, described security requirements for Ad Hoc routing, and for the most important, it improved an authenticated routing protocol. In this protocol, its routing messages were signed by node’s private key, thus then successfully defeated many kinds of attacks. However, there are some limitations. This paper provides a matter to improve it with higher transmission ratio and better security.
C. D. Lu and Q. W. Li, "The Optimization of an Authenticated Routing Protocol for Ad Hoc Networks", Applied Mechanics and Materials, Vols. 20-23, pp. 916-919, 2010