2017
DOI: 10.4236/ijcns.2017.1012018
|View full text |Cite
|
Sign up to set email alerts
|

HiMAC: Hierarchical Message Authentication Code for Secure Data Dissemination in Mobile Ad Hoc Networks

Abstract: Mobile ad-hoc networks are wireless self-organized networks in which mobile nodes can connect directly to each other. This fact makes such networks highly susceptible to security risks and threats, as malicious nodes can easily disguise as new trusted nodes and start attacking the network after a certain period of time. Hence, the security of data transmission in MANET has been a hot topic in the past years. Several research works attempted to detect and stop various attacks on MANET nodes and packets. This pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…Node identification and key management have been used to strengthen its security. Indeed, in [10] the authors integrated the HiMAC mechanism to secure the distribution of data in AODV. Based on trust and message authentication the HiMAC's technique prevent an intruder from capturing routing information, which makes it easier for him to carry out attacks by generating a diversion of the route thus causing a black hole attack.…”
Section: Cryptographic Techniquesmentioning
confidence: 99%
“…Node identification and key management have been used to strengthen its security. Indeed, in [10] the authors integrated the HiMAC mechanism to secure the distribution of data in AODV. Based on trust and message authentication the HiMAC's technique prevent an intruder from capturing routing information, which makes it easier for him to carry out attacks by generating a diversion of the route thus causing a black hole attack.…”
Section: Cryptographic Techniquesmentioning
confidence: 99%
“…To update the ECI information we added number of bits from each combination, separately. The packet and allied ECI prepared for further transmission can be (5).…”
Section: Computation At the Intermediate Nodementioning
confidence: 99%
“…In comparison to their proposed method, our proposed HM2-MAC based MANET achieves significantly high throughput, which guarantee reliability of data transmission even under varying topology or network conditions. In [5], authors proposed hierarchical message authentication code for secure data dissemination in mobile ad hoc networks (HiMAC). This approach was designed as an identify-based message authentication code for data security in MANET.…”
Section: Research Articlementioning
confidence: 99%
See 2 more Smart Citations