Delay Efficient Authenticated Anonymous Secure Routing for MANETs

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Trust Based Data Security and Secure Anonymous Routing For MANETs

For many applications of the mobile ad hoc networks (MANETs) deployed in adversary environments, anonymous communications with data confidentiality and integrity is important. A major requirement is to provide unidentifiability and unlinkability to the mobile nodes and their traffics.The existing protocols are vulnerable to security threats like global eavesdropper attacks, fake routing packets...

متن کامل

secure routing protocol: affection on manets performance

in mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.since all nodes in the manets would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. so evaluating the perf...

متن کامل

Location Based Anonymous Routing Protocol for MANETS

Privacy is needed in ad hoc networks. In order to provide anonymous routing protocol in MANETs the location of source and destination can be concealed by using “notify and go” mechanism and broadcasting. In this paper, we address some of the issues arising in MANETs by using an anonymous routing protocol. Location Based Anonymous Routing Protocol partitions the network into zones for anonymity ...

متن کامل

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks

Anonymity and authenticated key exchange should be paid much more attention in secure mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as we know, few papers on secure routing protocols have addressed both the anonymity and authenticated key exchange. Therefore, in this paper, we present a new secure anonymous routing protocol with authenticated key exch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2016

ISSN: 0975-8887

DOI: 10.5120/ijca2016911089