首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks
  • 本地全文:下载
  • 作者:Varadhaganapathy, S. ; Natarajan, A. M. ; Sivanandam, S. N.
  • 期刊名称:Journal of Computer Science
  • 印刷版ISSN:1549-3636
  • 出版年度:2011
  • 卷号:7
  • 期号:5
  • 页码:651-656
  • DOI:10.3844/jcssp.2011.651.656
  • 出版社:Science Publications
  • 摘要:Problem statement: An Ad hoc network has been defined as a self-organizing, dynamic topology network formed by a group of wireless mobile nodes. Minimal configuration, absence of infrastructure and quick deployment, would make ad hoc networks convenient for emergency situations other than military applications. In recent years, security in Ad hoc Networks as a research topic had started to receive attention from a growing number of researchers. Approach: Several ad hoc network routing protocols have been proposed; only some of them consider the security problems. To secure an ad hoc network, the attributes like availability, confidentiality, integrity, authentication and non-repudiation may be considered. In this study, authentication is taken into consideration. Here, Double Hash Authentication Technique (DHT) has been incorporated for ad hoc networks. The security associations between nodes were established, when they were in the vicinity of each other, by exchanging appropriate cryptographic information. This security mechanism has been simulated on Dynamic Source Routing (DSR) protocol in addition to Self-Healing and Optimized Routing Technique (SHORT) made the routing secure for ad hoc networks. Result: The results have shown that in a moderately changing network, the Double Hash Technique has provided secure routing even in the presence of malicious nodes. Conclusion: The Double Hash Technique in association with SHORT has improved the performance of the DSR protocol.
  • 关键词:Double Hash Authentication Technique (DHT); ad hoc network; Dynamic Source Routing (DSR); SHORT; Source Address (SA); Destination Address (DA); Neighbor Node Address (NA); malicious node; routing protocols; network topology
国家哲学社会科学文献中心版权所有