2015
DOI: 10.1016/j.procs.2015.06.022
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing the Security of MANETs using Hash Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The protocols that were early proposed are not designed to operate when the attackers are present. Thus, this led to some major challenges in MANETs as explained in the Table 1 [13][14][15][16][17][18][19][20]. In a random manner, nodes can be connected and mobile dynamically.…”
Section: Mobile Ad-hoc Networkmentioning
confidence: 99%
“…The protocols that were early proposed are not designed to operate when the attackers are present. Thus, this led to some major challenges in MANETs as explained in the Table 1 [13][14][15][16][17][18][19][20]. In a random manner, nodes can be connected and mobile dynamically.…”
Section: Mobile Ad-hoc Networkmentioning
confidence: 99%
“…The computational cost is evaluated for all participants in the network. Ravilla and Putta [29] used a hashing algorithm (keyed‐hash message authentication code‐secure hashing algorithm‐512) formulated to prevent distributed denial of service attacks. Firstly, HMAC‐SHA 512 is presented to ensure that the data packets are received at the destination successfully.…”
Section: Related Workmentioning
confidence: 99%
“…The simulation is carried in Matlab and C++ using open-ssl cryptograohic library. Ravilla and Putta [15] proposed secure ZRP routing protocol using HMAC-SHA512 and a keyed-HMAC-SHA512 for providing data integrity and authentication. It employs a secret key along with the hash function to send data from source to destination securely.…”
Section: A Cryptography Based Solutionsmentioning
confidence: 99%
“…A punishment mechanism is used to isolate misbehaving nodes by ignoring their requests. Ravilla and Putta further proposed a trust based secure ZRP combining HMAC-SHA512 and trust based routing [15]. The trust value of a node is increased whenever it transmits a packet and decreased otherwise.…”
Section: Trust Management and Reputation-based Systemsmentioning
confidence: 99%