Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

High Secure Routing Protocol with Authentication and Confidentiality Increased in Wireless Ad Hoc Networks.

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Abstract:
      Wireless mobile ad hoc networks are the special type of networks where a collection of mobile devices forms a temporary network without any established infrastructure aid. Having no central infrastructure and random devices movement cause some problems in ad hoc networks such as routing and security. Routing is a critical function in mobile ad hoc networks. The most important requirement for routing protocols is the capability to act in adversarial environments. In this article a secure routing algorithm is suggested to increase confidentiality and authentication in ad hoc routing protocols. The secure routing algorithm presented with two methods high secure AODV authenticated with asymmetric algorithms (HSAODV1) and high secure AODV authenticated with MAC algorithms (HSAODV2) which every one of them has two phases as follows: at the first phase of HSAODV1, the source, destination and intermediate nodes authenticate by using digital signature and asymmetric algorithms, and in the second phase, the protocol utilizes one way key-chain for increased data confidentiality. In the first phase of HSAODV2, the destination and intermediate nodes authenticate by using MAC algorithm for source node and the second phase operates approximately as the second phase of HSAODV1. In order to assess the functionality of these algorithms, security matrix, normalized routing overhead and energy consumption are evaluated for the proposed algorithm. [ABSTRACT FROM AUTHOR]
    • Abstract:
      [MediaObject not available: see fulltext.] [ABSTRACT FROM AUTHOR]
    • Abstract:
      Copyright of Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ) is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)