Proceedings of the 1st ACM Workshop on Wireless Security 2002
DOI: 10.1145/570681.570684
|View full text |Cite
|
Sign up to set email alerts
|

An on-demand secure routing protocol resilient to byzantine failures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
257
0
12

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 378 publications
(269 citation statements)
references
References 10 publications
0
257
0
12
Order By: Relevance
“…Tree nodes with a group sequence number at least as great as that in the RREP ignore RREP messages (lines [13][14]. Otherwise, a node computes the total path weight by summing the weight of all the links on the specified path from the multicast tree to itself (lines [15][16][17][18]. If the total weight is less than any previously forwarded matching response (same requester, multicast group and response sequence number), the hop count authentication is valid and all the signatures accumulated on the response are valid, then the node appends its identifier to the end of the message, updates the hop count authentication information, signs the entire message and rebroadcasts it.…”
Section: Route Discoverymentioning
confidence: 99%
See 4 more Smart Citations
“…Tree nodes with a group sequence number at least as great as that in the RREP ignore RREP messages (lines [13][14]. Otherwise, a node computes the total path weight by summing the weight of all the links on the specified path from the multicast tree to itself (lines [15][16][17][18]. If the total weight is less than any previously forwarded matching response (same requester, multicast group and response sequence number), the hop count authentication is valid and all the signatures accumulated on the response are valid, then the node appends its identifier to the end of the message, updates the hop count authentication information, signs the entire message and rebroadcasts it.…”
Section: Route Discoverymentioning
confidence: 99%
“…An intermediate node on the route checks if the signature on MACT is valid and if MACT contains the same sequence number as the one in the original RREQ (lines 5-7). The node then adds to its list of tree neighbors the previous node and the next node on the route as downstream and upstream neighbors, respectively, and sends MACT along the forward route (lines [15][16][17][18][19][20][21]. During the propagation of the MACT message tree neighbors use their public keys to establish pairwise shared keys, which will be used to securely exchange messages between tree neighbors.…”
Section: Multicast Route Activationmentioning
confidence: 99%
See 3 more Smart Citations