Have a personal or library account? Click to login
Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network Cover

Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network

Open Access
|Dec 2015

References

  1. [1] Bagrodia R., Meyerr R., PARSEC: A Parallel Simulation Environment for Complex System, UCLA technical report, 1997.
  2. [2] Broch, J., Maltz A.D., Johnson B.D., Hu C.Y., Jetcheva J., A performance comparison of multi-hop wireless ad hoc network routing protocols, Journal of Mobile Computing and Networking, 1998, 85-97.10.1145/288235.288256
  3. [3] Capkun S.,Buttya L., Hubaux J.P., Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions On Mobile Computing, 2, 1, 2003,1-13.10.1109/TMC.2003.1195151
  4. [4] Corson S., Macker J., Mobile Ad hoc Networking (MANET): routing protocol performance issues and evaluation considerations, Network Working Group, RFC:2501,1999.10.17487/rfc2501
  5. [5] Eastlake D., Jones P., US secure hash algorithm 1 (SHA1). Network Working Group.RFC-3174, 2001.10.17487/rfc3174
  6. [6] Grobler T. L., Penzhorn W. T., Fast decryption methods for rsa cryptosystem, In 7th AFRICON Conference in Africa,1, 2004,361-364.
  7. [7] Huang Q., Cukier J., Kobayashi H., Liu B., Zhang J., Fast authenticated key establishment protocols for self-organizing sensor networks, Mitsubishi Electric Research Laboratories,2004.10.1145/941350.941371
  8. [8] Lamport L., Password authentication with insecure communication. Communications of ACM, 24,11,1981,770-772.10.1145/358790.358797
  9. [9] Nekkanti R.K., Lee C.W., Trust based adaptive on demand ad hoc routing protocol. In: Proceedings Of The 42nd Annual Southeast Regional Conference, 2004, 88-93.10.1145/986537.986558
  10. [10] Rivest R.L., Shamir A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Communications of ACM, 21,2, 1978, 120-126.10.1145/359340.359342
  11. [11] Saha H.N., Bhattacharyya D., Banerjee B., Mukherjee S., Singh R. and Ghosh D., Self-Organized key management based on fidelity relationship list and dynamic path. International Journal of Application or Innovation in Engineering & Management (IJAIEM),3,7,2014,97-100.
  12. [12] Saha H.N, Bhattacharyya D., Banerjee B., Mukherjee S., Singh R., Ghosh D., A review on attacks and secure routing protocols in MANET, In CIBTech, International Journal of Innovative Research and Review (JIRR), 1, 2, 2013,12-31.
  13. [13] Saha H N., Bhattacharyya D., Banerjee P K., Fidelity based on demand secure (FBOD) routing in mobile adhoc network, International Journal of Advanced Computer Science and Applications,Special Issue on Wireless & Mobile Networks(IJACSA), 2011,26-34.
  14. [14] Sanzgiri K., Dahill B., Levine B., Belding-Royer E., A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols (ICNP), 2002,78-87.
  15. [15] Zapata M., Asokan N., Securing ad hoc routing protocols. In: Proceedings of the ACM Workshop on Wireless Security (WiSe), 2002,1-10.10.1145/570681.570682
  16. [16] Zeng, X., Bagrodia. R., Gerla M., GloMoSim: a library for parallel simulation of large-scale wireless networks, In Proc. of 12th Workshop on Parallel and Distributed Simulation (PADS),1998,154 - 161. 10.1145/278009.278027
DOI: https://doi.org/10.1515/fcds-2015-0016 | Journal eISSN: 2300-3405 | Journal ISSN: 0867-6356
Language: English
Page range: 267 - 298
Submitted on: Oct 29, 2014
Accepted on: Jun 20, 2015
Published on: Dec 12, 2015
Published by: Poznan University of Technology
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2015 Himadri Nath Saha, Rohit Singh, Debika Bhattacharyya, P.K. Banerjee, published by Poznan University of Technology
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.