1999
DOI: 10.1016/s1389-1286(98)00022-x
|View full text |Cite
|
Sign up to set email alerts
|

Lowering security overhead in link state routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2002
2002
2016
2016

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 12 publications
0
22
0
Order By: Relevance
“…Considering DSR approach this paper assessed the security protocols like QoS-Guided Route Discovery [13], sQos [15], Ariadne [16] and CONFIDANT [17]. It illustrated the boundaries and assaults of them which are sensitive and complicated to be generated through familiar logic regarding their characteristics.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering DSR approach this paper assessed the security protocols like QoS-Guided Route Discovery [13], sQos [15], Ariadne [16] and CONFIDANT [17]. It illustrated the boundaries and assaults of them which are sensitive and complicated to be generated through familiar logic regarding their characteristics.…”
Section: Resultsmentioning
confidence: 99%
“…Thirdly, if there is a provision of a junction sending a REQUEST, many sent packets arise from a single direction discovery request. Securing Quality of Service Route Discovery: QoS Guided Route Discovery gave wings for SQoS [15] to evolve, which is a superior provision for on demand ad hoc network routing. This form completely depends on symmetric cryptography whose primal are in three to four orders of magnitude that is far more quick and efficient as compared with asymmetric cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…First, we discuss DSR [17]. The secure versions, such as, QoS Guided Route Discovery [18], Securing Quality of Service Route Discovery [19], Ariadne [20] and CONFIDANT [21] are presented as well. Second, AODV [22] is discussed with its secure versions, CORE [23], SAODV [24] and SAR [25].…”
Section: Related Work a Manet Unicast Routing Protocolsmentioning
confidence: 99%
“…It is thus straightforward to attempt to provide a low-cost signature mechanism. The idea in [7] is to have each router commit to a hash chain, a long precomputed sequence of values that the router provably generated. The hash chain is calculated by the successive operation of a hash function [8,9] on a random value.…”
Section: Link State Protocolsmentioning
confidence: 99%