Abstract

Routing protocol algorithm is the basis for establishing a communication link between nodes, and its performance affects the survival of Ad Hoc networks directly. If the malicious node control network communication link, it will launch a variety of attacks, in order to achieve the purpose of stealing network data or destroy the network environment. Considering the weak security of traditional reactive routing protocol in Ad Hoc network, a secure strategy is proposed to resist the attack behavior. The secure reactive routing strategy consists of two parts, the routing request and the routing response. The route establishment based on the successful authenticated for relevant nodes, and then the data is encrypted and transmitted. The algorithm is combined with the identity authentication, hash function, public key encryption and other security strategy, reduce the control probability for the routing information by malicious nodes effectively, and ensure the data communication between the source node and the destination node can be on a safe and reliable route.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call