A study on effectiveness using security routing based on mobile ad-hoc networks

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on Mobile Ad-hoc Network and the application of Mobile Ad-hoc Network has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in Mobile Ad-hoc Network are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

Author supplied keywords

Cite

CITATION STYLE

APA

Lee, C. seung. (2015). A study on effectiveness using security routing based on mobile ad-hoc networks. International Journal of Security and Its Applications, 9(7), 141–152. https://doi.org/10.14257/ijsia.2015.9.7.13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free