Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
 
<< vorige    volgende >>
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
           Alle artikelen van de bijbehorende aflevering
                                       Details van artikel 6 van 20 gevonden artikelen
 
 
  A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
 
 
Titel: A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks
Auteur: Emmanouil A. Panaousis
George Drew
Grant P. Millar
Tipu A. Ramrekha
Christos Politis
Verschenen in: International journal of network security & its applications
Paginering: Jaargang 2 (2010) nr. 4 pagina's 143-162
Jaar: 2010
Inhoud: Contemporary personal computing devices are increasingly required to be portable and mobileenabling user’s wireless access, to wired network infrastructures and services. This approach tomobile computing and communication is only appropriate in situations where a coherentinfrastructure is available. There are many situations where these requirements are not fulfilledsuch as; developing nations, rural areas, natural disasters, and military conflicts to name but a few.A practical solution is to use mobile devices interconnected via a wireless medium to form anetwork, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found inwired networks. Security in MANETs is an issue of paramount importance due to the wireless natureof the communication links. Additionally due to the lack of central administration security issues aredifferent from conventional networks. For the purposes of this article we have used the “WMN testbed”to enable secure routing in MANETs. The use of cryptography is an efficient proven way ofsecuring data in communications, but some cryptographic algorithms are not as efficient as othersand require more processing power, which is detrimental to MANETs. In this article we haveassessed different cryptographic approaches to securing the OLSR (Optimised Link State Routing)protocol to provide a basis for research. We conclude the paper with a series of performanceevaluation results regarding different cryptographic and hashing schemes. Our findings clearlyshow that the most efficient combination of algorithms used for authentication and encryption areSHA-1 (Secure Hash Algorithm-1) and AES (Advanced Encryption Standard) respectively. Usingthis combination over their counterparts will lead to a considerable reduction in processing timeand delay on the network, creating an efficient transaction moving towards satisfying resourceconstraints and security requirements.
Uitgever: Academy & Industry Research Collaboration Center (AIRCC) (provided by DOAJ)
Bronbestand: Elektronische Wetenschappelijke Tijdschriften
 
 

                             Details van artikel 6 van 20 gevonden artikelen
 
<< vorige    volgende >>
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland