Younho Lee, Heeyoul Kim, Byungchun Chung, Jaewon Lee, H. Yoon
{"title":"基于ID密码系统的自组织网络按需安全路由协议","authors":"Younho Lee, Heeyoul Kim, Byungchun Chung, Jaewon Lee, H. Yoon","doi":"10.1109/PDCAT.2003.1236290","DOIUrl":null,"url":null,"abstract":"A routing protocol that is appropriate for an ad hoc network is needed. But research into routing protocols for ad hoc networks so far have mainly targeted efficiency and assume a trusted environment. But these protocols are not well operated in the networks that adversaries exist in. We propose a new on-demand secure routing protocol for ad hoc networks using an ID based cryptosystem. Our protocol can authenticate all nodes in the routing path with less network resource consumption than previous secure routing protocols. And our protocol does not need the fixed infrastructure without unrealistic assumptions because of using an ID based cryptosystem.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"144 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":"{\"title\":\"On-demand secure routing protocol for ad hoc network using ID based cryptosystem\",\"authors\":\"Younho Lee, Heeyoul Kim, Byungchun Chung, Jaewon Lee, H. Yoon\",\"doi\":\"10.1109/PDCAT.2003.1236290\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A routing protocol that is appropriate for an ad hoc network is needed. But research into routing protocols for ad hoc networks so far have mainly targeted efficiency and assume a trusted environment. But these protocols are not well operated in the networks that adversaries exist in. We propose a new on-demand secure routing protocol for ad hoc networks using an ID based cryptosystem. Our protocol can authenticate all nodes in the routing path with less network resource consumption than previous secure routing protocols. And our protocol does not need the fixed infrastructure without unrealistic assumptions because of using an ID based cryptosystem.\",\"PeriodicalId\":145111,\"journal\":{\"name\":\"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies\",\"volume\":\"144 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"21\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDCAT.2003.1236290\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDCAT.2003.1236290","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On-demand secure routing protocol for ad hoc network using ID based cryptosystem
A routing protocol that is appropriate for an ad hoc network is needed. But research into routing protocols for ad hoc networks so far have mainly targeted efficiency and assume a trusted environment. But these protocols are not well operated in the networks that adversaries exist in. We propose a new on-demand secure routing protocol for ad hoc networks using an ID based cryptosystem. Our protocol can authenticate all nodes in the routing path with less network resource consumption than previous secure routing protocols. And our protocol does not need the fixed infrastructure without unrealistic assumptions because of using an ID based cryptosystem.