Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Security and Communi...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Security and Communication Networks
Article . 2008 . Peer-reviewed
License: Wiley Online Library User Agreement
Data sources: Crossref
DBLP
Article . 2020
Data sources: DBLP
versions View all 2 versions
addClaim

Securing reactive routing protocols in MANETs using PKI (PKI‐DSR)

Authors: Benamar Kadri; Mohammed Feham; Abdallah M'hamed;

Securing reactive routing protocols in MANETs using PKI (PKI‐DSR)

Abstract

AbstractMobile Ad hoc Networks (MANETs) are deployed in many new domestic and public applications, contributing to new requirements in terms of performance and efficiency. However due to their nature, some usual network services such as routing and security are not carried out as well as expected. Securing routing protocols is one of these challenging tasks, since security is not natively implemented in ad hoc routing, and the extensions given in the literature are complex and vulnerable against several attacks. Therefore in this paper, we propose an implementation of public key infrastructure (PKI) exploiting the route discovery and route reply mechanisms of reactive routing protocols to publish self‐issued certificates in a distributed fashion. These certificates are used by mobile nodes to secure communications, ensure authentication, integrity, confidentiality, and detect attacks in mobile ad hoc networks. Our proposed scheme is simple and utilizes the underlying protocol as a support for certificate publishing; therefore it does not affect the performance of the network. In addition, all the operations in our scheme are performed in the network layer making it useful for heterogeneous networks since it has no additional relation with other network layers such as MAC and PHY. Copyright © 2008 John Wiley & Sons, Ltd.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    3
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
3
Average
Average
Average
gold