Browse > Article

Secure routing security algorithm S-ZRP used Zone Routing Protocol in MANET  

Seo Dae-Youl (Dept. of Electronics and Communications Engineering, Kwangwoon University)
Kim Jin-Chul (Dept. of Electronics and Communications Engineering, Kwangwoon University)
Kim Kyoung-Mok (Dept. of Electronics and Communications Engineering, Kwangwoon University)
Oh Young-Hwan (Dept. of Electronics and Communications Engineering, Kwangwoon University)
Publication Information
Abstract
An mobile ad hoc network(MANET) is a collection of wireless computers (nodes), communicating among themselves over multi-hop paths, without the help of any infrastructure such as base stations or access points. Prior research in MANET has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we design and evaluate the Secure Zone Routing Protocol(T-ZRP), a secure ad hoc network routing protocol is based on the design of the hash chain. In order to support use with nodes of limited CPU processing capability, and to guard against Denial-of-Service attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient one-way hash functions and don't use asymmetric cryptographic operations in the protocol. Proposed algorithm can safely send to data through authentication mechanism and integrity about routing establishment.
Keywords
MANET; Hash; ZRP;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Z. J. Haas and M. R. Realrnan, 'The Bodercast Resol.ution ProtocoI(BRP) for Ad Hoc Networks,' Internet Draft draft-zone-brp-protocol-02.txt, July., 2002
2 Z. J. Haas and M. R. Realrnan, 'The Intrazone Routing Protocol. (IARP) for Ad Hoc Networks,' Internet Draft draft-zone-iarp-protocol.-02, txt, July., 2002
3 Peh Chern Liang, Tan Tong Joo, Teo Meng Wee, 'Ad Hoc Wireless Networks-A Study on Zone Routing Protocol', School of Computing, National Univercity of Singapore, 2004
4 Don Coppersmith, Markus Jakobsson, 'Almost Optimal Hash Sequence Traversal,' Scientific Literature Digital Library, Dec. 2000
5 Don Coppersmith, Markus Jakobsson, 'Almost Optimal Hash Sequence Traversal', Scientific Literature Digital Library, 2002
6 Z. J. Haas and M. R. Realrnan, 'The Zone Routing Protocol. for Ad Hoc Networks,'Internet Draft draft-zone-routing-protocol.-01.txt, Aug., 1998
7 Yih-Chum Hu, Adrian Perrig, David B. Johnson, 'Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,' The 8th ACM International Conference on Mobile Computing and Networking, Dec. 2002
8 Elizabeth M. Royer, Chai-Keong Toh, 'A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks', IEEE Personal Communications, April, 1999, pp, 46-55   DOI   ScienceOn
9 김경자,장태무, '애드혹 네트워크에서 ZRP를 기반으로 하는 경로 탐색 기법,' 정보처리학회논문지 C,제3권,293-300쪽,2004년 6월   과학기술학회마을   DOI
10 권오성,정의헌,김준년, 'MANET에 대해 QoS를 지원하는 ZRP의 성능연구', 한국통신학회 논문지 제28권 3A호 200-214쪽,2003년 2월   과학기술학회마을
11 Chai-Keong Toh, Georgia Elizabeth M. Royer, 'A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,' IEEE Personal Communications, Vol. 6, Issue 2, April 1999, pp. 46-55   DOI   ScienceOn
12 Jan Schaumann, 'Analysis of the Zone Routing Protocol.', http://www.netmeister.org/misc/zrp, 2002
13 Tao Wan, Evanglos Kranakis, P.C. van Oorschot, ' Securing the Destination Sequenced Distance Vector Routing Protocol (S-DSDV)', IEEE Wireless Communications, Vol. 4, Aug. 2004
14 Yih-Chum Hu, Adrian Perrig, David B. Johnson, 'Secure Efficient Distance Vector Routing for mobile wireless ad hoc networks,' Fourth IEEE ?Workshop on Mobile Computing Systems and Applications, Dec. 2003
15 Charles E. Perkins, Pravin Bhagwat, 'Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers' ,The ACM SIGCOMM Conference on Communications Architectures, Oct. 2002   DOI