Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Authenticated routing for ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Ad hoc networks can be used in scenarios such as military and emergency relief, and have the advantage of establishing communications independently. Securing the ad hoc routing protocol is necessary to prevent attacks in these applications. However, securing protocols for mobile ad hoc networks presents challenges due to energy consuming processes such as authentication of hosts and verification of messages. In this paper, we propose an efficient forwarding mechanism for secure ad hoc routing protocols, based on public key cryptography.