On Secure Mobile Ad hoc Routing

被引:0
作者
Li, Xu [1 ]
Nayak, Amiya [2 ]
Ryl, Isabelle [3 ]
Simplot, David [3 ]
机构
[1] Carleton Univ, SCS, Ottawa, ON K1S 5B6, Canada
[2] Univ Ottawa, SITE, Ottawa, ON, Canada
[3] Univ Lille 1, IRCICA LIFL, INRIA Futurs, CNRS UMR 8022, F-59655 Villeneuve Dascq, France
基金
加拿大自然科学与工程研究理事会;
关键词
Mobile Ad hoc Networks; Routing Protocols; Security; Anonymity; Secure Routing; Anonymous Routing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many plain routing protocols have been proposed for mobile ad hoc networks. These protocols all assume cooperative networks and focus only on routing effectiveness and efficiency. However, mobile ad hoc networks are not a friendly environment for various reasons in nature. Routing Protocols without any security feature can put entire network at risk. As security becomes an increasingly important issue, secure mobile ad hoc routing is attracting more and more research attention. In this paper, we make a comprehensive investigation on the issue of network security and conduct an up-to-date survey of secure mobile ad hoc routing protocols.
引用
收藏
页码:229 / 254
页数:26
相关论文
共 37 条
  • [1] [Anonymous], 2005, MOBIHOC
  • [2] [Anonymous], P LASTED INT C COMM
  • [3] [Anonymous], 2002, P ACM WORKSH WIR SEC
  • [4] [Anonymous], 2003, ACM INT S MOB AD HOC
  • [5] [Anonymous], 2001, P 2 ACM INT S MOB AD
  • [6] Bose P., 1999, PROC 3 INT WORKSHOP, P48, DOI DOI 10.1145/313239.313282
  • [7] Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
    Buchegger, S
    Le Boudec, JY
    [J]. 10TH EUROMICRO WORKSHOP ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, PROCEEDINGS, 2002, : 403 - 410
  • [8] Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
  • [9] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88
  • [10] Dent Alexander W., 2004, USERS GUIDE CRYPTOGR