Secure Position Aided
ثبت نشده
چکیده
Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. These routing protocols use geographical information to make forwarding decisions, resulting in a significant reduction in the number of routing messages. However, current position aided routing protocols were not designed for use in high-risk environments, as position information is broadcasted in the clear allowing anyone within range, including the enemy, to receive. We study methods of protecting position information in MANET routing protocols, and ways to use the position information to enhance performance and security of MANET routing protocols. We introduce " Secure Position Aided Ad hoc Routing " (SPAAR), a routing protocol designed to use protected position information to improve security, efficiency, and performance in MANET routing.
منابع مشابه
رابطهی بین سبک دلبستگی ایمن، خود- تمایزیافتگی (موقعیت من) و رضایت زناشویی با میانجیگری خوشبینی زوجها
The current research with the aim of investigating the relation between differentiation (I-Position), secure attachment style and marital satisfaction with couple optimism intermediary was done among the first –grade students parental of Darab city in the years of 2012-2013. Three hundreds and fourteen parents were selected using the method of multi-clustering sampling and they completed the qu...
متن کاملEvaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)
Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency on a fixed infrastructure. There have been many studies done in this area to improve the quality and efficiency of the routing protocols in MANETs. However unique characteristics of MANETs topology such as open peer-to-...
متن کاملAdaptive Universal Composability Framework for Server-Aided Threshold Signature
The threshold signature scheme is a protocol that allows any subset of t parties out of n to generate a signature. Since the t members can cooperate together to compute the secret key, we introduce the server-aided threshold signature, which provides controllability for activating the signing function in a certain enhanced way. In this study, we present a server-aided threshold RSA signature pr...
متن کاملAuthenticated Session Keys and Their Server-aided Computation
Key exchange is one of the elementary prerequisites for secure communications. This paper rst discusses some desirable properties of key exchange protocols, and then presents a set of protocols for Diie-Hellman based authenticated key exchange. This paper then considers a server-aided approach to fast computation of shared secrets, which may be useful for smart card implementation of key exchange.
متن کاملA Computer Aided Design of a Secure Registration Protocol
We use the formal language LOTOS to specify a registration protocol between a user and a Trusted Third Party that requires mutual authentication We explain how a model based veri cation method can be used to verify its ro bustness to attacks by an intruder This method is also used to nd a simpler protocol that remains secure
متن کامل