Skip to main content

A Secure Routing Protocol SDSR for Mobile Ad Hoc Networks

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3794))

Included in the following conference series:

Abstract

Mobile Ad Hoc networks (MANET) are composed of a group of wireless mobile nodes that can communicate with each other. Different from normal networks, MANET is easy to be attacked. The attacking to the protocol can paralyze the network, so the security of routing protocol is an important part of the Ad Hoc networks security. This paper proposes a secure on-demand routing protocol SDSR. It uses digital signature and node monitoring to ensure security. It can protect route information from many kinds of attacks, and has good network performance as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Johnson, D.B., Maltz, D.A., Hu, Y.C.: The Dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR). IETF Mobile Ad hoc Networks Working Group, Internet Draft (April 2003)

    Google Scholar 

  2. Johnson, D.B., Maltz, D.A.: Mobile Computing. Kluwer Academic Publishers, Boston (1996)

    Google Scholar 

  3. Sanzgiri, K., Dahill, B.: A Secure Routing Protocol for Ad Hoc Networks. In: IEEE International Conference on Network Protocols (IC2 NP), Paris,France (2002)

    Google Scholar 

  4. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, USA (2002)

    Google Scholar 

  5. Royer, E.M., Toh, C.K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications (4), 46–55 (1999)

    Google Scholar 

  6. Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In: ACM MOBICOM 2002 (2002)

    Google Scholar 

  7. Yi, S., Naldurg, P., Kravets, R.: Security Aware Ad Hoc Routing for Wireless Networks. UIUCDCS-R-2001-2241 Technical Report, pp. 299–302 (2001)

    Google Scholar 

  8. Resnick, P., Zeckhauser, R., et al.: Reputation Systems. Communications of the ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  9. Zhu, B., Wan, Z.: Anonymous Secure Routing in Mobile Ad-Hoc Networks. In: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCB 2004), pp. 102–108 (2004)

    Google Scholar 

  10. Lu, B., Pooch, U.W.: Cooperative Security-Enforcement Routing in Mobile Ad Hoc Networks. In: Proc. the 4th International Workshop on Mobile and Wireless Communications Network, pp. 157–161 (February 2002)

    Google Scholar 

  11. Sumathy, V., Narayanasmy, P.: GLS With Secure Routing in Ad Hoc Networks. In: Proc. Conference on Convergent Technologies for Asia-Pacific Region, February 2003, pp. 1072–1076 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chuanhe, H., Jiangwei, L., Xiaohua, J. (2005). A Secure Routing Protocol SDSR for Mobile Ad Hoc Networks. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_27

Download citation

  • DOI: https://doi.org/10.1007/11599463_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30856-0

  • Online ISBN: 978-3-540-32276-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics