Secure Position Aided

ثبت نشده
چکیده

Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. These routing protocols use geographical information to make forwarding decisions, resulting in a significant reduction in the number of routing messages. However, current position aided routing protocols were not designed for use in high-risk environments, as position information is broadcasted in the clear allowing anyone within range, including the enemy, to receive. We study methods of protecting position information in MANET routing protocols, and ways to use the position information to enhance performance and security of MANET routing protocols. We introduce " Secure Position Aided Ad hoc Routing " (SPAAR), a routing protocol designed to use protected position information to improve security, efficiency, and performance in MANET routing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

رابطه‌ی بین سبک دلبستگی ایمن، خود- تمایزیافتگی (موقعیت من) و رضایت زناشویی با میانجی‌گری خوش‌بینی زوج‌ها

The current research with the aim of investigating the relation between differentiation (I-Position), secure attachment style and marital satisfaction with couple optimism intermediary was done among the first –grade students parental of Darab city in the years of 2012-2013. Three hundreds and fourteen parents were selected using the method of multi-clustering sampling and they completed the qu...

متن کامل

Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)

Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency on a fixed infrastructure. There have been many studies done in this area to improve the quality and efficiency of the routing protocols in MANETs. However unique characteristics of MANETs topology such as open peer-to-...

متن کامل

Adaptive Universal Composability Framework for Server-Aided Threshold Signature

The threshold signature scheme is a protocol that allows any subset of t parties out of n to generate a signature. Since the t members can cooperate together to compute the secret key, we introduce the server-aided threshold signature, which provides controllability for activating the signing function in a certain enhanced way. In this study, we present a server-aided threshold RSA signature pr...

متن کامل

Authenticated Session Keys and Their Server-aided Computation

Key exchange is one of the elementary prerequisites for secure communications. This paper rst discusses some desirable properties of key exchange protocols, and then presents a set of protocols for Diie-Hellman based authenticated key exchange. This paper then considers a server-aided approach to fast computation of shared secrets, which may be useful for smart card implementation of key exchange.

متن کامل

A Computer Aided Design of a Secure Registration Protocol

We use the formal language LOTOS to specify a registration protocol between a user and a Trusted Third Party that requires mutual authentication We explain how a model based veri cation method can be used to verify its ro bustness to attacks by an intruder This method is also used to nd a simpler protocol that remains secure

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003