2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA) 2017
DOI: 10.1109/iceca.2017.8203733
|View full text |Cite
|
Sign up to set email alerts
|

A secure AODV routing protocol with node authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Content may change prior to final publication. Trust-based relaying [147] Cluster-based relaying [148] Secure MACbased relaying [149], [150] Cross-layerbased relaying [151]- [153] Topologybased relaying [154] IP-based relaying [155]- [157] Mobility-based relaying [146], [158], [159] Proactive [157], [158], [160] Reactive [161] One-way [162] Two-way [163], [164] Freshness-based [146], [156], [164]- [170] Encryption-based [146], [154], [156], [163], [164], [166]- [174] Access-based [146], [163], [164], [166]- [174] System Integrity-based [132], [156], [163], [164], [166], [169], [173], [174] This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…”
Section: Security-aware Protocols For Smart M-iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Content may change prior to final publication. Trust-based relaying [147] Cluster-based relaying [148] Secure MACbased relaying [149], [150] Cross-layerbased relaying [151]- [153] Topologybased relaying [154] IP-based relaying [155]- [157] Mobility-based relaying [146], [158], [159] Proactive [157], [158], [160] Reactive [161] One-way [162] Two-way [163], [164] Freshness-based [146], [156], [164]- [170] Encryption-based [146], [154], [156], [163], [164], [166]- [174] Access-based [146], [163], [164], [166]- [174] System Integrity-based [132], [156], [163], [164], [166], [169], [173], [174] This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…”
Section: Security-aware Protocols For Smart M-iotmentioning
confidence: 99%
“…Thus, these are often the primary preference of setups that focus on the services over smart M-IoT. • Reactive: Authentication protocols which focus on the on-demand verification of the users and support a direct linking between the network users are termed as reactive authentication [161]. Reactive authentication is fast in operations, but is usually, vulnerable to a lot of network attacks which raises a question about their secure usability for smart M-IoT.…”
Section: B Authentication Mode-basedmentioning
confidence: 99%
“…Each node in DSR discovers a path to the destination dynamically. Every packet going through the network knows the path it has to follow to reach the destination, a technique called source routing (Yadav and Hussain, 2017). The information about the route is stored in the header of the packet sent.…”
Section: Figmentioning
confidence: 99%
“…MANETs have unique characteristics that differentiate them from wired networks, namely their highly dynamic topology, wireless links and limited resources (Yadav and Hussain, 2017). One of the most important features making it complicated and expensive to improve the performance of this type of network is the mobility of nodes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation