earticle

논문검색

A Study on Effectiveness using Security Routing based on Mobile Ad-hoc Networks

원문정보

초록

영어

The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on Mobile Ad-hoc Network and the application of Mobile Ad-hoc Network has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in Mobile Ad-hoc Network are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

목차

Abstract
 1. Introduction
 2. Mobile Ad-hoc Network Routing and Security Environment
  2.1. AODV Routing Protocol
  2.2. Security Environment in Mobile Ad-hoc Network
 3. The Security Routing
  3.1. Security Routing Requirements
  3.2 Creation of Hash Tables
  3.3 Route Determination
 4. Experiments and Results Analysis
  4.1. Experimental Environment
  4.2. Efficiency Analysis
 5. Conclusion
 Acknowledgement
 References

저자정보

  • Cheol-seung Lee Dept. of Teacher Training & Liberal Arts, Kwangju Women’s University Gwangju, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.