Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks 


Vol. 32,  No. 12, pp. 1188-1193, Dec.  2007


PDF
  Abstract

This paper proposes a secure data forwarding scheme on source routing-based ad-hoc networks. The scheme uses two hash-key chains generated from a trusted third party to generate Message Authentication Codes for data integrity. The selected MAC keys are delivered to the ad-hoc node using a pre-shared secret between the trusted third party and a node. The proposed scheme does not require the PKI, or the provisioning of the pre-shared secrets among the ad-hoc nodes.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

H. Roh and S. Jung, "Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks," The Journal of Korean Institute of Communications and Information Sciences, vol. 32, no. 12, pp. 1188-1193, 2007. DOI: .

[ACM Style]

Hyosun Roh and Souhwan Jung. 2007. Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks. The Journal of Korean Institute of Communications and Information Sciences, 32, 12, (2007), 1188-1193. DOI: .

[KICS Style]

Hyosun Roh and Souhwan Jung, "Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks," The Journal of Korean Institute of Communications and Information Sciences, vol. 32, no. 12, pp. 1188-1193, 12. 2007.