Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao https://doi.org/10.1...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
https://doi.org/10.1109/iske.2...
Article . 2017 . Peer-reviewed
License: STM Policy #29
Data sources: Crossref
versions View all 1 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

On the secure optimized link state routing (SOLSR) protocol for MANETs

Authors: Sajjad Hussain; Muhammad Azhar Iqbal; M. Najam-ul-Islam; Qingchun Chen; Mushtaq Ahmad;

On the secure optimized link state routing (SOLSR) protocol for MANETs

Abstract

A plethora of routing protocols are available for effective and efficient data dissemination in MANETs. But due to broadcast nature of wireless communications, these protocols are prone to diverse security attacks. In this work, the Secure Optimized Link State Routing (SOLSR) protocol is proposed to fill the breach for security attacks while finding path(s) from source to destination by including message authentication code (MAC) value that is appended to message as a signature, followed by encryption and Global secret key in both HELLO messages and Topology control (TC) messages. Timestamp mechanism is used to avoid replay attacks because authentication and encryption cannot prevent replay attacks. This paper also presents the NS-2 simulation results to assess the SOLSR protocol and the achieved performance comparison between SOLSR and OLSR over different network scenarios. It is shown that the proposed SOLSR outperforms the OLSR in terms of the achieved security, data overhead, packet loss and delay.

Related Organizations
  • BIP!
    Impact byBIP!
    citations
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    6
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
citations
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
6
Top 10%
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!