A secure data transmission protocol for mobile ad hoc networks

被引:0
|
作者
Lu, Shejie [1 ]
Li, Jun [1 ]
Liu, Zhiyuan [1 ]
Cui, Guohua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Peoples R China
来源
关键词
ad Hoc network; secure data transmission; intrusion detection; malicious behavior judgment;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure routing and data transmission has stimulated wide interest in Ad Hoc network research since it is more vulnerable to attacks due to its structural characteristics. Several efficient and secure schemes have been proposed to protect the network from external attacks. However, they still lack very efficient ways to detect and resist internal attacks. Here we proposed a secure data transmission protocol (SDTP) based on the Reed-Solomon errorcorrect coding to achieve secure data transmission in a Byzantine attack-existing environment. This protocol can distinguish malicious behaviors from transmission errors and locate the malicious node accurately. The algorithms used in this protocol also apply to secure routing protocols.
引用
收藏
页码:184 / +
页数:2
相关论文
共 50 条
  • [41] 2HARP: A secure routing protocol for mobile ad hoc networks
    Yau, PW
    Mitchell, CJ
    [J]. 5TH WORLD WIRELESS CONGRESS, PROCEEDINGS, 2004, : 1 - 6
  • [42] Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks
    Rahman, Sk Md Mizanur
    Nasser, Nidal
    Inomata, Atsuo
    Okamoto, Takeshi
    Mambo, Masahiro
    Okamoto, Eiji
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (02) : 179 - 189
  • [43] A self-secure routing protocol for large mobile ad hoc networks
    Van Vinh, Nguyen
    Jun, Heesung
    Kim, Myung-Kyun
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2007, : 516 - 520
  • [44] Secure Routing Protocol Considering Load Distribution in Mobile Ad hoc Networks
    Ohata, Yuri
    Umeda, Sayaka
    Kamimoto, Takashi
    Shigeno, Hiroshi
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 840 - 847
  • [45] A new reactive secure routing protocol for mobile ad-hoc networks
    Saha, Soma
    Chaki, Rituparna
    Chaki, Nabendu
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, : 103 - +
  • [46] SECURE 2ACK ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS
    Vijaya, K.
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 752 - 758
  • [47] A distributed transmission power control protocol for mobile ad hoc networks
    Muqattash, A
    Krunz, MM
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2004, 3 (02) : 113 - 128
  • [48] Performance evaluation of transmission control protocol in mobile ad hoc networks
    Ahmed, A
    Zaidi, SMH
    Ahmed, N
    [J]. 2004 INTERNATIONAL NETWORKING AND COMMUNICATIONS CONFERENCE, PROCEEDINGS, 2004, : 13 - 18
  • [49] Performance study of a secure routing protocol in wireless mobile ad hoc networks
    Alsaadi, Mohamad Y.
    Qian, Yi
    [J]. 2007 2ND INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING, VOLS 1 AND 2, 2007, : 425 - +
  • [50] SIP: A secure incentive protocol against selfishness in mobile ad hoc networks
    Zhang, YC
    Lou, WJ
    Fang, YG
    [J]. 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 1679 - 1684