Mobility

Authentication Based and Optimized Routing Technique in Mobile Ad Hoc Networks

Download Now Free registration required

Executive Summary

As the technology for ad hoc wireless networks gains maturity, comprehensive security solutions based on realistic trust models and addressing all prevalent issues like routing key management and cooperation enforcement are expected to appear. The solutions presented in this paper only cover a subset of threats and are far from providing a comprehensive answer to the security problem in ad hoc networks. This paper analyzes the performance of the DSR protocol with the application of Dual Hash Technique in association with SHORT. This paper could be extended to other protocols like TORA.

  • Format: PDF
  • Size: 256.4 KB