Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments 


Vol. 39,  No. 5, pp. 304-308, May  2014


PDF
  Abstract

As users generate lots of contents anytime and anywhere with an explosive growth of the number of mobile devices, Content centric networking (CCN) has emerged as a new networking architecture. However, the efficient CCN routing scheme is required for ad hoc network support because of its one to one message exchange characteristics. So, this paper proposes the new CCN ad hoc routing scheme using on-demand approach, which includes the secure routing configuration scheme based on multiple hash operation. It is shown from the simulation that the proposed method can provide lower control overhead because of its two-fold routing configuration architecture.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Lee and J. Lee, "Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 39, no. 5, pp. 304-308, 2014. DOI: .

[ACM Style]

Ju-Yong Lee and Ji-Hoon Lee. 2014. Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments. The Journal of Korean Institute of Communications and Information Sciences, 39, 5, (2014), 304-308. DOI: .

[KICS Style]

Ju-Yong Lee and Ji-Hoon Lee, "Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 39, no. 5, pp. 304-308, 5. 2014.