Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Secure routing in ad hoc networks for reactive next hop routing protocols
Publication

Publications

Secure routing in ad hoc networks for reactive next hop routing protocols

Title
Secure routing in ad hoc networks for reactive next hop routing protocols
Type
Article in International Conference Proceedings Book
Year
2004
Authors
Crisostomo, S
(Author)
FCUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Prior, R
(Author)
FCUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Conference proceedings International
Pages: 109-115
International Conference on Wireless Networks/International Conference on Pervasive Computing and Communications
Las Vegas, NV, JUN 21-24, 2004
Indexing
Publicação em ISI Web of Knowledge ISI Web of Knowledge - 0 Citations
Publicação em ISI Web of Science ISI Web of Science
Publicação em Scopus Scopus - 0 Citations
COMPENDEX
Scientific classification
FOS: Natural sciences > Computer and information sciences
Other information
Authenticus ID: P-000-CWK
Abstract (EN): Many security issues are raised with the incremental deployment of ad hoc networks. This paper proposes a secure routing protocol applied to reactive next hop ad hoc routing protocols, denoted AD hoc SEcure Routing Reactive Next Hop (ADSER-RNH). The aim of this protocol is to mitigate the major security issues of ad hoc routing. The main characteristics of the proposal are its support of message integrity and signing and key distribution, with low computational complexity in the majority of tasks performed. ADSER-RNH takes as a baseline some current security protocols, trying to gather their benefits so as to mitigate their current needs. In summary, this protocol is able to mitigate identity problems through signatures, trust issues through prevention of wrong route advertisements, and replays through sequence number and unique values generation. Encryption of data is also possible through a key distribution algorithm.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 7
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

SRBQ and RSVPRAgg: A comparative study (2004)
Article in International Scientific Journal
Prior, R; Sargento, S; Brandao, P; Crisostomo, S
Performance evaluation of the RSVP reservation aggregation model (2004)
Article in International Scientific Journal
Prior, R; Sargento, S; Brandao, P; Crisostomo, S
Efficient reservation-based QoS architecture (2003)
Article in International Scientific Journal
Prior, R; Sargento, S; Brandao, P; Crisostomo, S
Comparative evaluation of two scalable QoS Architectures (2004)
Article in International Scientific Journal
Prior, R; Sargento, S; Brandao, P; Crisostomo, S
Improving AODV with Preemptive Local Route Repair (2005)
Article in International Conference Proceedings Book
Crisostomo, S; Sargento, S; Brandao, P; Prior, R

See all (6)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-21 at 04:49:47 | Privacy Policy | Personal Data Protection Policy | Whistleblowing