Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-7 of 7 total results
Reducing the Routing Overhead in Secure Mobile AD HOC ...
Ad hoc On-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) protocols have been proposed for mobile ad hoc network. A MANET is a number of mobile wireless devices which are the structure of the network of any pre-existing infrastructure. All mobile nodes work both as a router as well as host....
Security in mobile ad-hoc networks using soft encryption ...
Various routing protocols have been proposed for MANETs. These vary from the table-driven protocols like Destination-Sequenced Distance Vector (DSDV) , which is based on the classical Bellman-Ford algorithm, to on-demand protocols like Dynamic Source Routing (DSR) and Ad-hoc On Demand Distance Vector (AODV). These protocols work well in benign ......
Applying puzzle encryption in the on-demand routing ...
This means that at every given time each node is equipped with its own hash-chain, a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance Vector (DSDV) routing protocol. On Demand Anonymous Routing in ad hoc networks ODAR (is proposed by Denh Sy, Rex Chen and Lichun Bao)....
 Outsider Attack Prevention in Unobservable Secure On ...
Marcus Schöller, “Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs)” 4]. USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 5, MAY 2012 5]. Ad hoc network specific attacks held by Adam Burg. 6]....
 Encryption Scheme for Secure Routing in Ad Hoc Networks
on-demand routing protocols secure. The study will help in making protocols more robust against attacks and standardize parameters for security in protocols. Keywords: Security, Ad hoc Networks, Routing Protocols, Key Management 1. Introduction Recent years have witnessed a proliferation of mobile devices. Corporations and...
 SECURE BASED ROUTING PROTOCOL WITH CRYPTOGRAPHY DATA ...
and non repudiation. But in ad hoc network each node will know the others public key its a challenge. Seung Yi and all; proposed a secure routing protocol called Security-Aware Ad-Hoc Routing (SAR). SAR is the generalized framework for any on demand ad-hoc routing protocol. SAR uses Key distribution or secret sharing mechanism....
 APPLYING PUZZLE ENCRYPTION IN THE ON-DEMAND ROUTING ...
it to protect the ad hoc routing and forwarding protocols. From the security design perspective, the MANETs have no clear line of defense. Unlike wired networks that have dedicated routers, each mobile node in an ad hoc network may function as a router and forward packets for other peer nodes. Routing in ad hoc networks has become a popular...