IEEE International Conference on Communications, 2005. ICC 2005. 2005
DOI: 10.1109/icc.2005.1495075
|View full text |Cite
|
Sign up to set email alerts
|

Secure data forwarding in wireless ad hoc networks

Abstract: Network routing in wireless ad hoc networks is liable to attacks that may have a grave impact on network operations. Such attacks can be targeted at the route discovery process or the data packet forwarding process. Although the protection of route discovery is a critical prerequisite to ensure the robustness of the routing process, secured route discovery by no means eliminates attacks on routing. We, accordingly, propose a secure data forwarding protocol that detects faulty links in the packet forwarding pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Once the trust value is set unreasonably, it will cause great misjudgment and form a false warning, thus affecting the performance of the entire network. In literature [12] In literature [13] Huang et al proposed to detect packet loss nodes based on one-way hash chain and one-time hash tag commitment. This detection method mainly relies on the form of forwarding redundant data packets and shared secret keys between nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Once the trust value is set unreasonably, it will cause great misjudgment and form a false warning, thus affecting the performance of the entire network. In literature [12] In literature [13] Huang et al proposed to detect packet loss nodes based on one-way hash chain and one-time hash tag commitment. This detection method mainly relies on the form of forwarding redundant data packets and shared secret keys between nodes.…”
Section: Related Workmentioning
confidence: 99%