SEMAP: Improving multipath security based on attacking point in Ad Hoc networks

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In hostile Ad hoc network, the possibility of being attacked or attacking others can't be avoided. Most current intrusion detection systems and secure routing protocols only focus on concrete attacking behaviors while neglecting the underlying attacking threat. So it's inevitable to choose malicious nodes during routing establishment. To construct a secure multipath route, we present SEMAP, a secure enhancement mechanism based on Attacking Point (AP) which converts the possibility of security threat to a concrete metric. AP is a description of security status of a node. AP of a node can be easily extended to that of link, path and path set, which provides an important reference in route selection. Our design can exclude the nodes that will be the objects of adversaries from the network before actual routing process. Simulation results show that SEMAP provides an effective security enhancement without compromising the efficiency of original routing protocol. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Lu, Z., Huang, C., Wang, F., & Rong, C. (2008). SEMAP: Improving multipath security based on attacking point in Ad Hoc networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5060 LNCS, pp. 134–148). https://doi.org/10.1007/978-3-540-69295-9_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free