2008
DOI: 10.1016/j.comcom.2007.10.021
|View full text |Cite
|
Sign up to set email alerts
|

Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
82
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 71 publications
(85 citation statements)
references
References 15 publications
3
82
0
Order By: Relevance
“…The routes are selected using a greedy approach on the basis of path length such that a node with a trust level of does not get more than packets on the route to the destination. At the destination, the message parts are then decrypted using the equations referred in [15].Thus, the TMR approach is found to be more secure than the multipath routing using disjoint paths (DMR), but it generally takes more time in route selection.…”
Section: Message Security Using Trust-based Multipath Routing : Tmrmentioning
confidence: 99%
See 3 more Smart Citations
“…The routes are selected using a greedy approach on the basis of path length such that a node with a trust level of does not get more than packets on the route to the destination. At the destination, the message parts are then decrypted using the equations referred in [15].Thus, the TMR approach is found to be more secure than the multipath routing using disjoint paths (DMR), but it generally takes more time in route selection.…”
Section: Message Security Using Trust-based Multipath Routing : Tmrmentioning
confidence: 99%
“…There have also been various secure routing techniques [14] - [16] that use multipath based routing where they break the data into different number of sub packets, encrypt them and then finally route them through different paths. In this work we have looked into the secure routing techniques DMR [14], TMR [15] and MTMR [16], and have designed the proposed FACES protocol to provide better security. These protocols [14] - [16] have been discussed in the following subsections, as these protocols are the ones that have been used for comparison with the proposed technique FACES.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The proposed paper [22], introduces a method of message security. It uses soft encryption techniques in which the message is divided into parts and the parts are self-encrypted.…”
Section: H Soft Encryption and Trust-based Multipath Routingmentioning
confidence: 99%