首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security
引用本文:王翠荣,杨孝宗,高远.Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security[J].东华大学学报(英文版),2005,22(3):18-22.
作者姓名:王翠荣  杨孝宗  高远
作者单位:[1]School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001 [2]Qinhuangdao School, Northeastern University, Qinhuangdao 066000
摘    要:IntroductionAs mobile ad hoc networks edge closer toward wide-spread deployment ,security issues have become a centralconcern and are increasingly i mportant . Due to thedecentralized nature of ad-hoc networks , securityrequirements are different from those of traditionalnetworks . Problems are caused for example by the weakphysical protection of the network nodes , the inherentinsecurity of the wireless communication channel , themobility of the nodes and their li mited processor andbattery r…

关 键 词:Act-hoc网络  需求距离向量  保密路由协议  数字签名  Blowfish密码系统  通信安全
收稿时间:2005-06-01

Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security
WANG Cui-rong,YANG Xiao-zong,GAO Yuan.Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security[J].Journal of Donghua University,2005,22(3):18-22.
Authors:WANG Cui-rong  YANG Xiao-zong  GAO Yuan
Abstract:Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol.
Keywords:ad-hoc network  secure routing protocol  Blowfish Cryptography  digital signature
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号