• No results found

Authentication in a layered security approach for mobile ad hoc networks

N/A
N/A
Protected

Academic year: 2019

Share "Authentication in a layered security approach for mobile ad hoc networks"

Copied!
13
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1 – Protocol Security Process [8]
Figure 2 – Addition of New Nodes in a MANET
Table 1 – Timing Analysis of Encryption Algorithms for Specific Key Size
Table 2 – Timing Analysis of Authentication in a Layered Approach

References

Related documents

Position-based routing protocols route packets towards the destination using greedy forwarding (i.e., an intermediate node forwards pack- ets to a neighbor that is closer to

SDRP’s ability to route service response messages to user agents was similar to that of protocols based on address-based routing, demonstrating the robustness of the

Various routing protocols or Gateway Discovery Approaches have been designed to discover proper internet gateway and to deliver the information to MANET user in an appropriate

In this section we discuss about the cryptographic protocols with intrusion mechanisms such as Bit-map table driven protocol (BTDRP) [7], Trust-based cooperation bit-map

Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise challenges such as certificate distribution and revocation, avoidance of

Abstract— Building proper routing protocols for a Mobile Ad-hoc Network (MANET) is a critical challenge because (1) flooding route requests often results in broadcast storm

Ideally techniques to mitigate the effects of malicious or unreliable nodes should: (i) require no modification to protocols, (ii) work with existing routing protocols, (iii)

Multiple routing protocols for the MANET architecture designed keeping in mind the high fidelity and mobility, bandwidth issues of this specialized hoc