๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Secure position-based routing protocol for mobile ad hoc networks

โœ Scribed by Joo-Han Song; Vincent W.S. Wong; Victor C.M. Leung


Publisher
Elsevier Science
Year
2007
Tongue
English
Weight
297 KB
Volume
5
Category
Article
ISSN
1570-8705

No coin nor oath required. For personal study only.

โœฆ Synopsis


In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of position-based routing protocols. In this paper, we propose a secure geographic forwarding (SGF) mechanism, which provides source authentication, neighbor authentication, and message integrity by using both the shared key and the TIK protocol. By combining SGF with the Grid Location Service (GLS), we propose a Secure Grid Location Service (SGLS) where any receiver can verify the correctness of location messages. We also propose a Local Reputation System (LRS) aiming at detecting and isolating both compromised and selfish users. We present the performance analysis of both SGLS and LRS, and compare them with the original GLS. Simulation results show that SGLS can operate efficiently by using effective cryptographic mechanisms. Results also show that LRS effectively detects and isolates message dropping attackers from the network.


๐Ÿ“œ SIMILAR VOLUMES


A secure multipath routing protocol in m
โœ Hao Yin; Yang Wang; Geyong Min; Sebastien Berton; Rui Guo; Chuang Lin ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 316 KB ๐Ÿ‘ 2 views

## Abstract Multipath routing can adapt to traffic changes, increase reliability and enhance the Quality of Service support in communication networks. This routing algorithm has been recognized as one of the salient features in Mobile __Ad hoc__ Networks (MANETs). However, existing multipath routin

Efficient identity-based security scheme
โœ Muhammad Bohio; Ali Miri ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 286 KB

Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that