期刊文献+

Authenticating QoS-Guaranteed Multicast Route Discovery for Ad hoc Networks

Authenticating QoS-Guaranteed Multicast Route Discovery for Ad hoc Networks
下载PDF
导出
摘要 This paper presents SEQMRAN,a novel secure efficient QoS multicast route discovery protocol for mobile ad hoc networks.The protocol relies entirely on one-time signature mechanism,HORSEI,with very efficient signing and verifying,and we do this by improving the HORSE protocol through the introduction of intermediate hash joints.The main purpose of SEQMRAN is to provide source authentication for QoS multicast routing discovery messages in MANET by constructing multicast tree with QoS and authentication constrains in mobile ad hoc networks.The performance measure of SEQMRAN is evaluated using network simulator NS2.The results represent that SEQMRAN produces less end-to -end packet latency than RSA public key encryption based secure routing scheme,and it is a feasible approach to securing multicast routing with multiple QoS constrains for mobile ad hoc networks. This paper presents SEQMRAN, a novel secure efficient QoS multicast route discovery protocol for mobile ad hoc networks. The protocol relies entirely on one-time signature mechanism, HORSEI, with very efficient signing and verifying, and we do this by improving the HORSE protocol through the introduction of intermediate hash joints. The main purpose of SEQMRAN is to provide source authentication for QoS multicast routing discovery messages in MANET by constructing multicast tree with QoS and authentication constrains in mobile ad hoc networks. The performance measure of SEQMRAN is evaluated using network simulator NS2. The results represent that SEQMRAN produces less end-to-end packet latency than RSA public key encryption based secure routing scheme, and it is a feasible approach to securing multicast routing with multiple QoS constrains for mobile ad hoc networks.
出处 《China Communications》 SCIE CSCD 2007年第1期48-55,共8页 中国通信(英文版)
基金 supported by the National Natural Science Foundation of China(under Grant No. 90304018,60672137) Specialized Research Fund for the Doctoral Program of Higher Education of China(under Grant No.20060497015)
关键词 ad HOC MAODV QOS security ROUTE ad hoc maodv QoS security route
  • 相关文献

参考文献11

  • 1YANG Mingxi,LI Layuan,FANG Yiwei.Securing Multicast Route Discovery for Mobile Ad Hoc Networks[J].Wuhan University Journal of Natural Sciences,2007,12(1):189-192. 被引量:3
  • 2Roy,S,Addada,V.G,Setia,S,Jajodia,S.Securing MAODV:attacks and countermeasures[].Sensor and Ad Hoc Communications and Networks IEEE SECON Second Annual IEEE Communications Society Conference on.2005
  • 3William D.Neumann."HORSE:An Extension of an r-Time Signature Scheme With Fast Signing and Verification,"[].Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC’’ ).
  • 4Jakobsson M.Fractal Hash Sequence Representation and Traversal[].IEEE International Symposium on Information Theory (ISIT’’’’).2002
  • 5Haiyun Luo,Jiejun Kong,Petros Zerfos,Songwu Lu,Lixia Zhang."URSA:Ubiquitous ??and Robust Access Control for Mobile Ad Hoc Networks,"[].IEEE ACM Transactions on Networking.2004
  • 6http://www.eskimo.com/-weidai/ .
  • 7Yih-Chun Hu,David B.Johnson."Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks,"[].Conference on Computer and Communications Security Proceeding of the nd ACM workshop on Security ofad hoc and sensor networks.2004
  • 8Hu YC,Perrig A,Johnson DB.Ariadne: A secure on-demand routing protocol for ad hoc networks[].Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking(MobiCom).2002
  • 9Charles E Perkins,Elizabeth M Royer,et al.Ad hoe on-demand distance vector (AODV) routing[]..2001
  • 10Zapata M G,Sokan N A.Securing Ad hoc Routing Protocols[].Proceedings of the ACM Workshop on Wireless Security (WiSe ).2002

二级参考文献8

  • 1Perrig A,Canetti R,Song D, et al.Efficient and Secure Source Authentication for Multicast[]./Network and Distributed System Security Symposium(NDSS ).2001
  • 2Zhu Yufang,Kunz T.MAODV Implementation for NS-2.26 (SCE-04-01[]..2004
  • 3Stallings W.Cryptography and Network Security Principles and Practice[]..2002
  • 4Neumann W D.HORSE: An Extension of an r-Time Signature Scheme with Fast Signing and Verification[]./ International Conference on Information Technology: Coding and Computing(ITCC’).2004
  • 5Luo Haiyun,Kong Jiejun,Zerfos P, et al.URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks[].IEEE ACM Transactions on Networking.2004
  • 6Roy S,Addada V G,Setia S, et al.Securing MAODV: Attacks and Countermeasures, Sensor and Ad Hoc Communications and Networks[]./IEEE SECON : Second Annual IEEE Communications Society Conference.2005
  • 7Saxena N,Tsudik G,Yi J H.Access Control in Ad Hoc Groups[].International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-PP ).2004
  • 8Wei Dai.Crypto++ 5.2.1 Benchmarks [C/OL]. http://www.eskimo.com/~weidai/ . 2006

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部