Multi-path security-aware routing protocol mechanism for ad hoc network

In Sung Han, Hwang Bin Ryou, Seok Joong Kang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The existing SAR(Security Aware Routing)[10] protocol is an Ad Hoc network protocol that finds a secure path using the security level of mobile nodes,. However, the SAR protocol sometimes transfers data through inefficient transmission paths because it always tries to find secure nodes for a safe transmission. Since it is a protocol based on AODV[6], the new routing path will be searched from the very beginning when a transmission fails. Obviously it will cause transmission delay Also during the new routing path search, the connection could not established when the security level of intermediate node is lower than the level requested by a source node. In this paper, MP-SAR (Multi-Path SAR) is suggested to improve the SAR protocol. MP-SAR maintains data confidentially offered by SAR, and it is a multiple security path discovery algorithm that can transfer data quickly and reliably by using the shortest efficient path among multi-paths.

Original languageEnglish
Title of host publicationProceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Pages620-626
Number of pages7
DOIs
Publication statusPublished - 2006
Externally publishedYes
Event2006 International Conference on Hybrid Information Technology, ICHIT 2006 - Cheju Island, Korea, Republic of
Duration: 2006 Nov 92006 Nov 11

Publication series

NameProceedings - 2006 International Conference on Hybrid Information Technology, ICHIT 2006
Volume1

Other

Other2006 International Conference on Hybrid Information Technology, ICHIT 2006
Country/TerritoryKorea, Republic of
CityCheju Island
Period06/11/906/11/11

ASJC Scopus subject areas

  • Media Technology

Fingerprint

Dive into the research topics of 'Multi-path security-aware routing protocol mechanism for ad hoc network'. Together they form a unique fingerprint.

Cite this