Mobility

Securing Routing Protocols Against Active Attacks in Mobile Ad Hoc Networks

Free registration required

Executive Summary

According to the inherent nature of mobile Ad Hoc networks, the mobility of members, traditional public key infrastructure based on the certificates, is not suitable for these networks. ID-based cryptography is known as an appropriate solution for securing these networks. Various routing protocols for these networks are proposed. In some of these protocols with the aim of increasing efficiency, reliable network environment is assumed, so the protocols are not suitable for such environments in which the adversaries are present in. This paper offers a secure routing protocol with the ability to authenticate all nodes in the route, in which it reduces the network resource consumption than previous protocols. Most secure routing protocols are vulnerable against active internal attacks such as Denial of Service attack.

  • Format: PDF
  • Size: 1132.7 KB