2010 Proceedings IEEE INFOCOM 2010
DOI: 10.1109/infcom.2010.5462115
|View full text |Cite
|
Sign up to set email alerts
|

Castor: Scalable Secure Routing for Ad Hoc Networks

Abstract: Abstract-Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have been proposed. In this paper, we take a fresh and comprehensive approach that addresses simultaneously three aspects: security, scalability and adaptability to changing network conditions. Our communication protocol, Castor, occupies a unique point in the design space: It does not use any control messages except simple packet ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(46 citation statements)
references
References 18 publications
0
46
0
Order By: Relevance
“…The second sub-category is based on reputation systems [5], [6], [7], [8]. Here the system depends on neighbour nodes to identify the malicious node.…”
Section: ) Reputation Systemsmentioning
confidence: 99%
“…The second sub-category is based on reputation systems [5], [6], [7], [8]. Here the system depends on neighbour nodes to identify the malicious node.…”
Section: ) Reputation Systemsmentioning
confidence: 99%
“…The set of rule accomplishes more packet transfer rates. [4] In 2008 Hovav Shacham & Brent Waters discovered a proof-of-retrievability system; an information storage system should convey a friend that he put all of a client's information. The main test is to make frameworks that are each practical and verifiably secure those thought it to be achievable to remove the client information from any prove that passes a confirmation check.…”
Section: Releated Work Reviewmentioning
confidence: 99%
“…But when the attacker performs a selective dropping, it gets enough credits and can continue as a part of the network. The second sub category is based on reputation systems [4], [5], [6], [7]. In this mechanism the neighbour nodes monitor the activity of all nodes.…”
Section: Related Workmentioning
confidence: 99%