{"title":"一种保护自组织路由协议的协作方法","authors":"T. Bouabana-Tebibel","doi":"10.1109/IMSAA.2011.6156364","DOIUrl":null,"url":null,"abstract":"Most of the secure ad hoc routing protocols are based on cryptographic solutions whose drawback is to decrease the network performances. In this paper, we propose a secure routing scheme for the DSR protocol. The proposed scheme combines the hash chains and digital signatures to provide a high level of security while reducing the costs of hop-by-hop signature verification. The proposed protocol is analyzed regarding its security. Several scenarios are used to demonstrate its efficiency in presence of attacks.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"221 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A collaborative approach to secure ad hoc routing protocols\",\"authors\":\"T. Bouabana-Tebibel\",\"doi\":\"10.1109/IMSAA.2011.6156364\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most of the secure ad hoc routing protocols are based on cryptographic solutions whose drawback is to decrease the network performances. In this paper, we propose a secure routing scheme for the DSR protocol. The proposed scheme combines the hash chains and digital signatures to provide a high level of security while reducing the costs of hop-by-hop signature verification. The proposed protocol is analyzed regarding its security. Several scenarios are used to demonstrate its efficiency in presence of attacks.\",\"PeriodicalId\":445751,\"journal\":{\"name\":\"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application\",\"volume\":\"221 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMSAA.2011.6156364\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMSAA.2011.6156364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A collaborative approach to secure ad hoc routing protocols
Most of the secure ad hoc routing protocols are based on cryptographic solutions whose drawback is to decrease the network performances. In this paper, we propose a secure routing scheme for the DSR protocol. The proposed scheme combines the hash chains and digital signatures to provide a high level of security while reducing the costs of hop-by-hop signature verification. The proposed protocol is analyzed regarding its security. Several scenarios are used to demonstrate its efficiency in presence of attacks.