Securing the ad hoc dynamic source routing protocol

Rajan Shankaran*, Vijay Varadharajan, Michael Hitchens

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

52 Downloads (Pure)

Abstract

Ad-hoc routing protocols are challenging to design and the need for security services further complicates the situation. So far the proposals for routing in ad-hoc networks offer no security mechanisms at all, or have only partial solutions for protecting the routing. In this paper, we present a scheme for providing security services for routing of control messages in an ad-hoc network. Our focus is on on-demand routing protocols for ad-hoc networks, specifically the Dynamic Source Routing Protocol.

Original languageEnglish
Title of host publication2006 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2006
EditorsA. H. Burgmeyer, L. Harsche
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1-4
Number of pages4
ISBN (Print)1424405173, 9781424405176
DOIs
Publication statusPublished - 2007
Event2006 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2006 - Wuhan, China
Duration: 22 Sept 200629 Sept 2006

Other

Other2006 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2006
Country/TerritoryChina
CityWuhan
Period22/09/0629/09/06

Bibliographical note

Copyright 2006 IEEE. Reprinted from Proceedings of 2nd IEEE international conference on wireless communications, networking and mobile computing (WiCOM 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'Securing the ad hoc dynamic source routing protocol'. Together they form a unique fingerprint.

Cite this