Design of Secure Routing Protocol Based on AODV

Article Preview

Abstract:

Existing schemes have been firstly analyzed for secure routing protocol in Ad hoc networks. Then we present a new scheme for secure routing protocol base on AODV. Security features in the routing protocol include threshold authentication mechanism based on elliptic curve cryptosystem algorithm and improved the process of authentication without relying on the availability of a certificate authority center. Furthermore, the neighbor supervising mechanism combining with reputation mechanism are adopted to strengthen the management and supervision to network nodes, make the whole process of routing protocol under administration and supervision.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1614-1617

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Cui Guo-hua, Zhang Wei, Chen Jing, Jiang Fan. Research of a Mutual Authenticated Secure AODV Protocol in Ad hoc. Computer engineering and science, Vol. 29 (2007), p.56.

Google Scholar

[2] Wang Juan. The Research and Improvement of Secure Routing Protocol in Ad hoc Network., Hefei University of Technology(2009).

Google Scholar

[3] Sun Yu, Wang Guan, Liu Jianwei. The Design of Lightweight Secure AODV Protocol Based on Game Theory and Cryptology. Information Theory and Information Security, Vol. 25 (2010), p.309.

DOI: 10.1109/icitis.2010.5689474

Google Scholar

[4] Yang Chengyun, Zhang Mingqing, Tang Jun. Design of Secure Efficient Routing Scheme Based on AODV. Computer Engineering, Vol. 36(2010), p.136.

Google Scholar

[5] Ali M. Sagheer, IEEE Member, and Hadeel M. Taher. Identity Based Cryptography for Secure AODV Routing Protocol. 20th Telecommunications forum ( 2012).

DOI: 10.1109/telfor.2012.6419182

Google Scholar

[6] Sanzgiri K, LaFlamme D, Dahill B, et al. Authenticated routing for Ad Hoc networks. IEEE Journal on Selected Areas in Communications, Vol. 23(2005), p.598.

DOI: 10.1109/jsac.2004.842547

Google Scholar

[7] Zhang Yihui. Research on secure routing protocol in Ad hoc networks. Fujian Normal University, (2009).

Google Scholar

[8] R. Sudha, S. Lecturer, CSE, Dr. D. Sivakumar. A Temporal table Authenticated Routing Protocol for Ad hoc Networks. Electronics, Communication and Computing Technologies, Vol. 28 (2011), p.8.

DOI: 10.1109/icecct.2011.6077060

Google Scholar