A ZRP-Based reliable route discovery scheme in ad-hoc networks

被引:0
作者
Kim, KJ [1 ]
Chang, TM [1 ]
机构
[1] Dongguk Univ, Dept Comp Engn, Seoul 100715, South Korea
来源
SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT | 2004年
关键词
ad-hoc network; authentication; query control mechanism; zone routing protocol;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad-hoc networks are groups of mobile hosts without any fixed infrastructure. Frequent changes in network topology owing to node mobility make these networks very difficult to manage. Therefore, enhancing the reliability of routing paths in ad-hoc networks gets more important. In this paper, we propose a ZRP(Zone Routing Protocol)-based route discovery scheme that can not only reduce the total hops of routing path, but improve security through authentications between two nodes. And to solve the difficulty in maintenance of routing paths owing to frequent changes of the network topology, we adopt a query control mechanism. The effectiveness of our scheme is shown by simulation methods.
引用
收藏
页码:325 / 331
页数:7
相关论文
共 50 条
[21]   Secure and anonymous mobile ad-hoc networks [J].
Mu, Y ;
Zhang, FG ;
Susilo, W .
2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, :1132-1136
[22]   Dynamic Encryption Technology in Ad-hoc Networks [J].
金朝晖 ;
王顺满 ;
许楷 ;
梁青 .
Journal of China Ordnance, 2007, (03) :221-225
[23]   QASEC: A secured data communication scheme for mobile Ad-hoc networks [J].
Usman, Muhammad ;
Jan, Mian Ahmad ;
He, Xiangjian ;
Nanda, Priyadarsi .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 :604-610
[24]   A Reachable and Fault Tolerant Scheme for Broadcast in Ad-Hoc Wireless Networks [J].
Wu, Fan ;
Li, Hsiao-Hui ;
Wang, Yao-Tien ;
Tsai, Ming-Lun .
JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (01) :71-80
[25]   An effective trust establishment scheme for authentication in Mobile Ad-Hoc Networks [J].
Wang, Guojun ;
Wang, Qiong ;
Ca, Jiannong ;
Guo, Minyi .
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, :749-+
[26]   An Improved Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks [J].
Yang, Xiaodong ;
Chen, Chunlin ;
Ma, Tingchun ;
Li, Yutong ;
Wang, Caifen .
PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, :2334-2338
[27]   Power-efficient reliable routing protocol for mobile ad-hoc networks [J].
Kim, KJ ;
Yoo, SJ .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (12) :4588-4597
[28]   Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks [J].
Hu, Xiaoming ;
Wang, Jian ;
Xu, Huajie ;
Liu, Yan ;
Zhang, Xiaojun .
INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2016, PT III, 2016, 9773 :11-20
[29]   Study on cooperation stimulation mechanism in route discovery of Ad hoc networks [J].
Huang, Lei ;
Liu, Li-Xiang .
Jisuanji Xuebao/Chinese Journal of Computers, 2008, 31 (02) :262-269
[30]   AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL An Authentication Protocol for Ad-hoc Networks [J].
Hamad, A. M. ;
Khedr, W. I. .
SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, :274-+