淡江大學機構典藏:Item 987654321/83271
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 63993/96712 (66%)
造访人次 : 3615852      在线人数 : 320
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/83271


    题名: An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks
    作者: HWANG, Ren Junn;HSIAO, Yu-Kai
    贡献者: 淡江大學資訊工程學系
    关键词: asymmetric link;wireless mesh networks;secures routing;identity-based cryptography
    日期: 2012-09
    上传时间: 2013-03-17 10:45:21 (UTC+8)
    出版者: Denshi Jouhou Tsuushin Gakkai
    摘要: This study proposes an efficient identity-based secure routing protocol based on Weil pairing, that considers symmetric and asymmetric links for Wireless Mesh Networks (WMNs). A wireless mesh network is a group of wireless mesh routers and several types of wireless devices (or nodes). Individual nodes cooperate by forwarding packets to each other, allowing nodes to communicate beyond the symmetric or asymmetric links. Asymmetric communication is a special feature of WMNs because of the wireless transmission ranges of different wireless devices may be different. The asymmetric link enhances WMN coverage. Ensuring security in WMNs has become an important issue over the last few years. Existing research on this topic tends to focus on providing security for routing and data content in the symmetric link. However, most studies overlook the asymmetric link in WMNs. This study proposes a novel distributed routing protocol that considers symmetric and asymmetric links. The proposed protocol guarantees the security and high reliability of the established route in a hostile environment, such as WMNs, by avoiding the use of unreliable intermediate nodes. The routes generated by the proposed protocol are shorter than those in prior studies. The major objective of the proposed protocol is to allow trustworthy intermediate nodes to participate in the path construction protocol. Using the proposed protocol, mesh clients out of mesh router wireless transmission range may discover a secure route to securely connect to the mesh router for Internet access. The proposed protocol enhances wireless mesh network coverage and assures security.
    關聯: IEICE Transactions on Communications E95.B(9), 頁2718-2727
    DOI: 10.1587/transcom.E95.B.2718
    显示于类别:[資訊工程學系暨研究所] 期刊論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML350检视/开启

    在機構典藏中所有的数据项都受到原著作权保护.

    TAIR相关文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈