Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Security for Wireless Ad--hoc Networks
Security for Wireless Ad--hoc Networks
SRDP: Securing Route Discovery in DSR
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Secure data communication in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
A wireless multihop network is emerging as one of the most important technologies in the field of ubiquitous networking. However, a number of formidable challenges remain, several of the most crucial been associated with robustness and network security. In this paper, we introduce a comprehensive resilient security framework for wireless ad hoc networks that are using multipath routing. It deploys an integrated multisignatures scheme and uses a self-certified public keying technique to ensure secure route discovery. In addition, it uses the Schnorr signature scheme along with an information dispersal algorithm to ensure secure data transfer. We provide security analysis of the proposed approach and compare it with several existing popular schemes. It can be seen that the proposed approach is more secure than other existing schemes. We also evaluated the proposed approach by means of computer simulation and compared its performance to that of the existing popular schemes. The results are in favor of the proposed technique in terms of efficiency and effectiveness.