Due to node mobility, the ad hoc network topology is dynamical so that on-demand routing protocols are more fit than other routing protocols. Most secure on-demand routing protocols are designed that the destination or source is able to detect the attacks on routing paths after accepting routing requests or routing replies. In this paper, we present a secure on-demand source routing protocol without the assumption of a specific cryptographic system provides per-hop broadcast authentication in routing discovery phase and security in communication phase and takes effect on our trust-based ad hoc environment. Our hop by hop broadcast authentication provides forwarding routing packets with their trust levels for abstaining from unreliable or malicious nodes. Through security analysis and discussion, we characterize our mechanism and show that it is effectively and efficiently. © IFIP International Federation for Information Processing 2005.
CITATION STYLE
Hsieh, M. Y., & Huang, Y. M. (2005). A secure on-demand routing with distributed authentication for trust-based ad hoc networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3779 LNCS, pp. 343–350). https://doi.org/10.1007/11577188_49
Mendeley helps you to discover research relevant for your work.