期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Performance of unique and secure routing protocol(USRP)in flying Adhoc Networks for healthcare applications
1
作者 J.Vijitha Ananthi P.Subha Hency Jose 《High-Confidence Computing》 EI 2024年第1期24-31,共8页
Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.I... Nowadays,Flying Adhoc Networks play a vital role due to its high efficiency in fast communication.Unmanned aerial vehicles transmit data much faster than other networks and are useful in all aspects of communication.In healthcare applications,wireless body area network transmits the data,whereas the security,which is the most important concern to be focused in a flying adhoc network is not satisfactory.Many intruders tamper the network,degrading the overall network performance.To avoid security issues,a unique and secure routing protocol that provides a single solution for five different types of attacks such as,black hole attacks,grey hole attacks,yoyo attacks,conjoint attack and jamming attacks,is proposed.The simulation results analyses the network performance by using the proposed routing table.In comparison to the other solutions rendered to resolve the affected network,this proposed routing protocol has a higher throughput,higher delivery rate,and lower delay.The Unique and Secure Routing Protocol(USRP)provides an integrated solution for an efficient and secure communication in a flying adhoc network. 展开更多
关键词 secure routing protocol Flying Adhoc Networks Unmanned aerial vehicles Mobile Adhoc network Attackers Denial of service attacks
在线阅读 下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:3
2
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things Wireless sensor network secure routing protocol Trust management
在线阅读 下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
3
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
在线阅读 下载PDF
A Partially Non-Cryptographic Security Routing Protocol in Mobile Ad Hoc Networks
4
作者 CHEN Jing CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1781-1784,共4页
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cry... In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations. 展开更多
关键词 ad hoc network security routing protocol partially non-cryptographic
在线阅读 下载PDF
Developing a reliable route protocol for mobile self-organization networks
5
作者 Shaohu Li Bei Gong 《High-Confidence Computing》 EI 2024年第3期1-12,共12页
Mobile ad hoc networks(MANETs),which correspond to a novel wireless technology,are widely used in Internet of Things(IoT)systems such as drones,wireless sensor networks,and military or disaster relief communication.Fr... Mobile ad hoc networks(MANETs),which correspond to a novel wireless technology,are widely used in Internet of Things(IoT)systems such as drones,wireless sensor networks,and military or disaster relief communication.From the perspective of communication and data collection,the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally,namely,according to the established network rules.However,mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution,openness,and distributed characteristics.Therefore,during the network operation,it is necessary to classify and detect the behavior and characteristics of each node.However,most existing research only analyzes and considers responses against a single or small number of attacks.To address these issues,this article first systematically analyzed and classified common active attacks in MANETs.Then,a node trust model was proposed based on the characteristics of various attacks;subsequently,a new secure routing protocol,namely,TC-AODV,was proposed.This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop,wormhole,Session hijacking,and other main attacks in MANETs.The NS3 simulation results show that the proposed routing protocol attains good transmission performance,can effectively identify various attacks and bypass malicious nodes,and securely complete the communication process. 展开更多
关键词 Mobile ad hoc networks AODV Trust level secure routing protocol Reliable path
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部