A secure on-demand routing with distributed authentication for trust-based ad hoc networks

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Due to node mobility, the ad hoc network topology is dynamical so that on-demand routing protocols are more fit than other routing protocols. Most secure on-demand routing protocols are designed that the destination or source is able to detect the attacks on routing paths after accepting routing requests or routing replies. In this paper, we present a secure on-demand source routing protocol without the assumption of a specific cryptographic system provides per-hop broadcast authentication in routing discovery phase and security in communication phase and takes effect on our trust-based ad hoc environment. Our hop by hop broadcast authentication provides forwarding routing packets with their trust levels for abstaining from unreliable or malicious nodes. Through security analysis and discussion, we characterize our mechanism and show that it is effectively and efficiently. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Hsieh, M. Y., & Huang, Y. M. (2005). A secure on-demand routing with distributed authentication for trust-based ad hoc networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3779 LNCS, pp. 343–350). https://doi.org/10.1007/11577188_49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free