2014 International Conference on Next Generation Networks and Services (NGNS) 2014
DOI: 10.1109/ngns.2014.6990234
|View full text |Cite
|
Sign up to set email alerts
|

New secure routing method & applications facing MitM attacks

Abstract: In real life we have one entry for multiple tasks, like police officer job that can vary from regulating traffic to other duties like keeping the peace, law enforcement, protection of people and property, etc.By applying the same concept on routers, we developed in this paper -using Graph Theory-a new routing method that adds the task of security while dispatching messages, so as to get around attacks based on sniffing like MitM.To validate the proposal, simulation was made to confirm that this new way of proc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…It's built of 16 nodes with 4 Core routers (R1 to R4) and 12 Edge routers (R5 to R16). Hence, it's impossible to execute pathfinder on it due to the limitation presented by (Chliah, Orhanou, & Hajji, 2014.…”
Section: Evolver Path Finder Stress Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…It's built of 16 nodes with 4 Core routers (R1 to R4) and 12 Edge routers (R5 to R16). Hence, it's impossible to execute pathfinder on it due to the limitation presented by (Chliah, Orhanou, & Hajji, 2014.…”
Section: Evolver Path Finder Stress Testingmentioning
confidence: 99%
“…We'll start by introducing the work done around pathfinder (Chliah, Orhanou, & Hajji, 2014), Secure Load Sharing algorithms , and also the newest release version (Chliah, Chetioui, Orhanou, & ELHajji, 2016) that provides possibility to handle network with hundreds of nodes. These algorithms combined with existing routing protocols, allow routers to ensure that two successive segments from the same packet will go through different paths.…”
Section: Introductionmentioning
confidence: 99%