Secure and Policy-Compliant Source Routing
نویسندگان
چکیده
منابع مشابه
UC-Secure Source Routing Protocol
The multi-path routing scheme provides reliable guarantee for mobile ad hoc network. A new method is proposed that is using to analyze the security of multi-path routing protocol within the framework of Universally Composable (UC) security. Based on the topological model that there exist adversarial nodes, the concept of plausible route is extended and the definition of plausible-route set is p...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملSecure Trust Management with Source Routing Protocol for MANETs
A MANET, in order to work properly, needs its nodes to work collaboratively. This is not always the case, and thus tools are developed to detect and identify uncooperative nodes. In this paper we present TADSR, a protocol based on an already existing secure routing protocol on top of which it adds trust management features. Our aim is to detect rogue nodes, and also to improve the overall perfo...
متن کاملA Secure Source Routing Protocol for Autonomous Mobile Mesh Networks
Mobile ad hoc networks (MANETs) are ideal for situations where a fixed infrastructure is unavailable or infeasible. Today’s MANETs, however, may suffer from network partitioning. This limitation makes MANETs unsuitable for applications such as crisis management and battlefield communications, in which team members might need to work in groups scattered in the application terrain. In such applic...
متن کاملSRDP: Secure route discovery for dynamic source routing in MANETs
Mobile ad hoc networks (MANETs) are collections of wireless mobile devices with restricted broadcast range and resources and no fixed infrastructure. Communication is achieved by communicating data along suitable routes that are dynamically discovered and maintained through association between the nodes. Discovery of such routes is a major task both from good organization and security points of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE/ACM Transactions on Networking
سال: 2009
ISSN: 1063-6692,1558-2566
DOI: 10.1109/tnet.2008.2007949