Authentication in a layered security approach for mobile ad hoc networks
Full text
Figure
Related documents
Position-based routing protocols route packets towards the destination using greedy forwarding (i.e., an intermediate node forwards pack- ets to a neighbor that is closer to
SDRP’s ability to route service response messages to user agents was similar to that of protocols based on address-based routing, demonstrating the robustness of the
Various routing protocols or Gateway Discovery Approaches have been designed to discover proper internet gateway and to deliver the information to MANET user in an appropriate
In this section we discuss about the cryptographic protocols with intrusion mechanisms such as Bit-map table driven protocol (BTDRP) [7], Trust-based cooperation bit-map
Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise challenges such as certificate distribution and revocation, avoidance of
Abstract— Building proper routing protocols for a Mobile Ad-hoc Network (MANET) is a critical challenge because (1) flooding route requests often results in broadcast storm
Ideally techniques to mitigate the effects of malicious or unreliable nodes should: (i) require no modification to protocols, (ii) work with existing routing protocols, (iii)
Multiple routing protocols for the MANET architecture designed keeping in mind the high fidelity and mobility, bandwidth issues of this specialized hoc