An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks


KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 4, pp. 156-163, Apr. 2013
10.3745/KTCCS.2013.2.4.156,   PDF Download:

Abstract

Routing protocol in ad hoc mobile networking has been an active research area in recent years However, the environments of ad hoc network tend to have vulnerable points from attacks, because ad hoc mobile network is a kind of ire1ess network without centralized authentication or fixed network infrastructure such as base stations. Also, existing muting protocols that are effective in a wired network become inapplicable in ad hoc mobile networks. To address these issues, several secure routing protocols have been proposed: SAODV and SRFFES. Even though our protocols are intensified security of networks than existing protocols, they can not deal fluidly with frequent changing of wireless environment. Moreover, demerits in energy efficiency are detected because they concentrated only safety routing. In this paper, we propose art energy efficient secure muting protocol for various ad hoc mobile environment. First of all, we provide that the nodes distribute security information to reliable nodes for secure muting. The nodes constitute tree-structured with around nodes for token escrow, this action will protect invasion of malicious node through hiding security information. Next, we propose multi-path routing based security level for protection from dropping attack of malicious node, then networks will vent data from unexpected packet loss. As a result, this algorithm enhances packet delivery ratio in network environment which has some malicious nodes, and a life Lime of entire network is extended through consuming energy evenly.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
L. J. Sik and K. S. Chun, "An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks," KIPS Transactions on Computer and Communication Systems, vol. 2, no. 4, pp. 156-163, 2013. DOI: 10.3745/KTCCS.2013.2.4.156.

[ACM Style]
Lee Jae Sik and Kim Sung Chun. 2013. An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks. KIPS Transactions on Computer and Communication Systems, 2, 4, (2013), 156-163. DOI: 10.3745/KTCCS.2013.2.4.156.