• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Secure Routing for Mobile Ad Hoc Networks (2002)

Cached

  • Download as a PDF

Download Links

  • [www.cs.uky.edu]
  • [wnl.ece.cornell.edu]
  • [wnl.ece.cornell.edu]
  • [icapeople.epfl.ch]
  • [people.ece.cornell.edu]
  • [cs.ucsb.edu]
  • [infoscience.epfl.ch]
  • [www.cs.huji.ac.il]
  • [www.ee.kth.se]
  • [infoscience.epfl.ch]
  • [www.ee.kth.se]
  • [www.ists.dartmouth.edu]
  • [people.kth.se]
  • [infoscience.epfl.ch]
  • [infoscience.epfl.ch]
  • [www.nchaubey.co.in]
  • [www.ee.kth.se]
  • [www.ee.kth.se]
  • [people.kth.se]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Panagiotis Papadimitratos , Zygmunt Haas
Venue:MOBILE COMPUTING AND COMMUNICATIONS REVIEW
Citations:597 - 14 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@ARTICLE{Papadimitratos02securerouting,
    author = {Panagiotis Papadimitratos and Zygmunt Haas},
    title = {Secure Routing for Mobile Ad Hoc Networks},
    journal = {MOBILE COMPUTING AND COMMUNICATIONS REVIEW},
    year = {2002},
    volume = {1},
    number = {2},
    pages = {27--31}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

For such self-organizing infrastructures as mobile ad hoc networks , envisioned to operate in an open, collaborative, and highly volatile environment, the importance of secu- rity cannot be underrated. The provision of comprehen- sive secure communication mandates that both route dis- covery and data forwarding be safeguarded. The discussed here Secure Routing Protocol (SRP) [1] counters malicious behavior that targets the discovery of topological informa- tion. The protection of the data transmission is a separate problem: an intermittently misbehaving attacker could first comply with the route discovery to make itself part of a route, and then corrupt the in-transit data. Protection of data transmission is addressed through our related Secure Message Transmission Protocol (SMT), which provides a flexible, end-to-end secure data forwarding scheme that naturally complement SRP. Here we discuss the design of SRP only, while SMT is the subject of another publication.

Keyphrases

mobile ad hoc network    data transmission    comprehen sive secure communication    volatile environment    self-organizing infrastructure    route discovery    in-transit data    topological informa tion    related secure message transmission protocol    separate problem    route dis covery    secure routing protocol    complement srp    counter malicious behavior    secu rity cannot    end-to-end secure data   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University