Analysis and Improving of Routing Protocols for Mobile Ad Hoc Networks

被引:0
作者
Zhao Min [1 ]
Zhou Jiliu [1 ]
机构
[1] Sichuan Univ, Sch Elect & Informat Engn, Chengdu, Sichuan, Peoples R China
来源
2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 3 | 2010年
关键词
mobile Ad Hoc networks; routing protocol; network security; design; route reconstruction;
D O I
10.1109/ICCAE.2010.5452082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For the dynamic topology and wireless channel features of mobile ad hoc networks, its security problem is always being a research focus. In the aspect of security routing protocol, the problem of how to enhance the security of mobile ad hoc networks was discussed in the paper. Based on the Ad Hoc networks structure and routing characters analysis, the requirements of Ad Hoc networks security routing protocol was brought forward. Then the insecure factors of current network routing protocol were analyzed in detail. To solve these insecure problems, corresponding solutions and material examples were proposed, meanwhile, an advanced strategy to optimizes the security route reconstruction was proposed.
引用
收藏
页码:217 / 221
页数:5
相关论文
共 8 条
  • [1] Analysis of randomized congestion control in DSDV routing
    Boukerche, A
    Fabbri, A
    Das, SK
    [J]. 8TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 2000, : 65 - 72
  • [2] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [3] HU Y, 2005, WIRELESS NETWORKS J, V11
  • [4] HU YC, 2003, P ACM WORKSH WIR SEC
  • [5] Perkins C.E., 2002, Ad-Hoc on-Demand Distance Vector Routing
  • [6] Authenticated routing for ad hoc networks
    Sanzgiri, K
    LaFlamme, D
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (03) : 598 - 610
  • [7] [詹鹏飞 Zhan Pengfei], 2003, [计算机应用, Computer Applications], V23, P44
  • [8] Securing ad hoc networks
    Zhou, LD
    Zygmunt, JH
    [J]. IEEE NETWORK, 1999, 13 (06): : 24 - 30