A secure routing protocol for mobile ad hoc network based on MAC and μTESLA
For solving the problem that traditional routing protocols for mobile ad hoc network does not give consideration to data′s completeness and confidentiality, a secure routing protocol is proposed by combining data′s completeness protection with confidentiality protection. On the aspect of protecting...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
National Computer System Engineering Research Institute of China
2018-06-01
|
Series: | Dianzi Jishu Yingyong |
Subjects: | |
Online Access: | http://www.chinaaet.com/article/3000084318 |
_version_ | 1818359389112762368 |
---|---|
author | Yang Guanxia Zhou Di Zhang Zhan |
author_facet | Yang Guanxia Zhou Di Zhang Zhan |
author_sort | Yang Guanxia |
collection | DOAJ |
description | For solving the problem that traditional routing protocols for mobile ad hoc network does not give consideration to data′s completeness and confidentiality, a secure routing protocol is proposed by combining data′s completeness protection with confidentiality protection. On the aspect of protecting data′s completeness, one way hash function and key are used to generate MAC, which is used to authenticate data′s completeness. On the aspect of protecting data′s confidentiality,μTESLA protocol is used to transmit cryptographic packets, deliver different key with different time interval, and execute a delayed disclosure of symmetric keys to simulate asymmetric mechanism, for reducing the resource consumption of authenticated broadcast. Simulation shows that the new method wins out over traditional routing protocols not only on the aspect of security, but also on the evaluating indicators including packer delivery ratio, routing overhead and end-to-end mean latency. |
first_indexed | 2024-12-13T20:44:07Z |
format | Article |
id | doaj.art-d236413f9fed49ad999bced2d5bbcca1 |
institution | Directory Open Access Journal |
issn | 0258-7998 |
language | zho |
last_indexed | 2024-12-13T20:44:07Z |
publishDate | 2018-06-01 |
publisher | National Computer System Engineering Research Institute of China |
record_format | Article |
series | Dianzi Jishu Yingyong |
spelling | doaj.art-d236413f9fed49ad999bced2d5bbcca12022-12-21T23:32:04ZzhoNational Computer System Engineering Research Institute of ChinaDianzi Jishu Yingyong0258-79982018-06-01446949810.16157/j.issn.0258-7998.1746873000084318A secure routing protocol for mobile ad hoc network based on MAC and μTESLAYang Guanxia0Zhou Di1Zhang Zhan2Department of Computer and Information Technology,Zhejiang Changzheng Vocational & Technical College, Hangzhou 310023,ChinaSichuan University of Arts and Science,Dazhou 635000,ChinaSchool of Electrical Engineering and Automation,Henan Polytechnic University,Jiaozuo 454000,ChinaFor solving the problem that traditional routing protocols for mobile ad hoc network does not give consideration to data′s completeness and confidentiality, a secure routing protocol is proposed by combining data′s completeness protection with confidentiality protection. On the aspect of protecting data′s completeness, one way hash function and key are used to generate MAC, which is used to authenticate data′s completeness. On the aspect of protecting data′s confidentiality,μTESLA protocol is used to transmit cryptographic packets, deliver different key with different time interval, and execute a delayed disclosure of symmetric keys to simulate asymmetric mechanism, for reducing the resource consumption of authenticated broadcast. Simulation shows that the new method wins out over traditional routing protocols not only on the aspect of security, but also on the evaluating indicators including packer delivery ratio, routing overhead and end-to-end mean latency.http://www.chinaaet.com/article/3000084318mobile ad hoc networkrouting protocolMACkeyone way functionauthenticated broadcast |
spellingShingle | Yang Guanxia Zhou Di Zhang Zhan A secure routing protocol for mobile ad hoc network based on MAC and μTESLA Dianzi Jishu Yingyong mobile ad hoc network routing protocol MAC key one way function authenticated broadcast |
title | A secure routing protocol for mobile ad hoc network based on MAC and μTESLA |
title_full | A secure routing protocol for mobile ad hoc network based on MAC and μTESLA |
title_fullStr | A secure routing protocol for mobile ad hoc network based on MAC and μTESLA |
title_full_unstemmed | A secure routing protocol for mobile ad hoc network based on MAC and μTESLA |
title_short | A secure routing protocol for mobile ad hoc network based on MAC and μTESLA |
title_sort | secure routing protocol for mobile ad hoc network based on mac and μtesla |
topic | mobile ad hoc network routing protocol MAC key one way function authenticated broadcast |
url | http://www.chinaaet.com/article/3000084318 |
work_keys_str_mv | AT yangguanxia asecureroutingprotocolformobileadhocnetworkbasedonmacandmtesla AT zhoudi asecureroutingprotocolformobileadhocnetworkbasedonmacandmtesla AT zhangzhan asecureroutingprotocolformobileadhocnetworkbasedonmacandmtesla AT yangguanxia secureroutingprotocolformobileadhocnetworkbasedonmacandmtesla AT zhoudi secureroutingprotocolformobileadhocnetworkbasedonmacandmtesla AT zhangzhan secureroutingprotocolformobileadhocnetworkbasedonmacandmtesla |