• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

A Security-Aware Routing Protocol for Wireless Ad Hoc Networks

Cached

  • Download as a PDF

Download Links

  • [www-faculty.cs.uiuc.edu]
  • [www.cse.fau.edu]
  • [www.cse.fau.edu]
  • [www-sal.cs.uiuc.edu]
  • [www.cis.temple.edu]
  • [www.utc.edu]
  • [www.cis.temple.edu]
  • [www.cis.temple.edu]
  • [www.cse.fau.edu]
  • [www.cse.fau.edu]
  • [www.cis.temple.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Unknown Authors
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{_asecurity-aware,
    author = {},
    title = {A Security-Aware Routing Protocol for Wireless Ad Hoc Networks},
    year = {}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Abstract — We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We develop a two-tier classification of routing protocol security metrics, and propose a framework to measure and enforce security attributes on ad hoc routing paths. Our framework enables applications to adapt their behavior according to the level of protection available on communicating nodes in an ad hoc network. I.

Keyphrases

security-aware routing protocol    wireless ad hoc network    security-aware ad hoc routing    protocol security metric    ad hoc network    new routing technique    enforce security    ad hoc route discovery    security attribute    ad hoc routing protocol    two-tier classification    ad hoc   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University