Advanced Secure Routing in Ad hoc mobile networks

被引:0
|
作者
Padmadas, M. [1 ,2 ]
Krishnan, N. [2 ]
Sasidharan, Sithara [2 ]
机构
[1] BSNL, Tirunelveli, India
[2] Manonmaniam Sundaranar Univ, Ctr Informat Technol & Engn, Tirunelveli, India
来源
2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2013年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A group of wireless mobile hosts making a temporary network without conventional infrastructure or central supervision is the ad hoc network. The main challenges exists in secure broadcast communication is enabling the receivers to verify that the data received originates from an authorized source and no change or modification made on it in the communication. In the case of un-trusted receivers and unreliable communication, this secure routing is more complicated. This paper provides a secure routing in ad hoc mobile network by detecting and avoiding un trusted hosts in the routes using the FACES(Friend Based Ad Hoc routing Using Challenges to Establish Security in MANETs Systems) protocol. This paper used an existing protocol such as TESLA (Timed Efficient Stream Loss Tolerant Authentication) in routing to show the actual standing of the FACES algorithm.
引用
收藏
页码:821 / 824
页数:4
相关论文
共 50 条
  • [1] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [2] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [3] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [4] Secure multipath routing for mobile ad hoc networks
    Kotzanikolaou, P
    Mavropodi, R
    Douligeris, C
    SECOND ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, PROCEEDINGS, 2005, : 89 - 96
  • [5] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [6] A secure routing protocol for mobile Ad hoc networks
    Li, Zhitang
    Shi, Shudong
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
  • [7] Survey on Secure Routing in Mobile Ad-hoc Networks
    Kannammal, A.
    Roy, S. Sujith
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN MACHINE INTERACTION (HMI), 2016, : 154 - 160
  • [8] A secure and pragmatic routing protocol for mobile ad hoc networks
    College of Computer, Huangshi Institute of Technology, Huangshi, Hubei 435003, China
    不详
    J. Donghua Univ., 2008, 1 (11-15):
  • [9] Anonymous secure routing in mobile ad-hoc networks
    Zhu, B
    Wan, ZG
    Kankanhalli, MS
    Bao, F
    Deng, RH
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 102 - 108
  • [10] On Secure Mobile Ad hoc Routing
    Li, Xu
    Nayak, Amiya
    Ryl, Isabelle
    Simplot, David
    AD HOC & SENSOR WIRELESS NETWORKS, 2007, 4 (03) : 229 - 254