Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

A Secure Routing Protocol for Wireless Ad Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Huaizhi Li ; University of Kentucky ; Singhal, M.

Ad hoc networks, which do not rely on infrastructure such as access points or base stations, can be deployed rapidly and inexpensively even in situations with geographical or time constraints. Ad hoc networks have attractive applications in both military and disaster situations and also in commercial uses like sensor networks or conferencing. However, the nature of ad hoc networks makes them vulnerable to attacks, especially in the routing protocol. How to protect an ad hoc routing protocol is an important research topic. In this paper, we present an on-demand secure routing protocol for ad hoc networks based on a distributed authentication mechanism. The protocol makes use of recommendation and trust evaluation to establish a trust relationship between network entities and uses feedback to adjust it. The protocol does not need the support of a trusted third party and can discover multiple routes between two nodes.

Published in:

System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on  (Volume:9 )

Date of Conference:

04-07 Jan. 2006