2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577) 2004
DOI: 10.1109/icc.2004.1313337
|View full text |Cite
|
Sign up to set email alerts
|

Security enhancement through multiple path transmission in ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
22
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(22 citation statements)
references
References 11 publications
0
22
0
Order By: Relevance
“…Some of the most widely discussed protocols are Authenticated Routing for Ad Hoc Networking (ARAN) [9], ARIADNE [10] and Watchdog Pathrater [11]. There have also been various secure routing techniques [14] - [16] that use multipath based routing where they break the data into different number of sub packets, encrypt them and then finally route them through different paths. In this work we have looked into the secure routing techniques DMR [14], TMR [15] and MTMR [16], and have designed the proposed FACES protocol to provide better security.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Some of the most widely discussed protocols are Authenticated Routing for Ad Hoc Networking (ARAN) [9], ARIADNE [10] and Watchdog Pathrater [11]. There have also been various secure routing techniques [14] - [16] that use multipath based routing where they break the data into different number of sub packets, encrypt them and then finally route them through different paths. In this work we have looked into the secure routing techniques DMR [14], TMR [15] and MTMR [16], and have designed the proposed FACES protocol to provide better security.…”
Section: Related Workmentioning
confidence: 99%
“…There have also been various secure routing techniques [14] - [16] that use multipath based routing where they break the data into different number of sub packets, encrypt them and then finally route them through different paths. In this work we have looked into the secure routing techniques DMR [14], TMR [15] and MTMR [16], and have designed the proposed FACES protocol to provide better security. These protocols [14] - [16] have been discussed in the following subsections, as these protocols are the ones that have been used for comparison with the proposed technique FACES.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations