A token-based secure routing protocol in Ad-Hoc networks

Bok Nyong Park, Jae W. Kim, Sang-Geun Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Ad-Hoc networks unlike conventional networks consist of only mobile nodes and have no support infrastructure such as base stations as mobile switching. There exist serious security problems in these Ad-Hoc networks due to the mobility of nodes. Unfortunately, there are still not many proper protocols for these problems. To provide secure routing in Ad-Hoc networks, it is essential to authenticate each node. Therefore, this paper proposes a token-based secure routing protocol in which each node should have a token in order to participate in the network operations for secure Ad-Hoc routing. The proposed protocol authenticates nodes with token, hash function, and digital signature so that it can provide safety to set up a routing path.

Original languageEnglish
Title of host publicationProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Sytems
EditorsT. Gonzalez
Pages494-499
Number of pages6
Edition1
Publication statusPublished - 2003
EventProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems - Marina del Rey, CA, United States
Duration: 2003 Nov 32003 Nov 5

Publication series

NameProceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems
Number1
Volume15

Other

OtherProceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems
Country/TerritoryUnited States
CityMarina del Rey, CA
Period03/11/303/11/5

Keywords

  • Ad-Hoc Networks
  • Authentication
  • Secure Routing

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A token-based secure routing protocol in Ad-Hoc networks'. Together they form a unique fingerprint.

Cite this