UOSPR:使用B.A.T.M.A.N实现快速安全传输的不可观察安全主动路由协议

S. Balaji, M. Prabha
{"title":"UOSPR:使用B.A.T.M.A.N实现快速安全传输的不可观察安全主动路由协议","authors":"S. Balaji, M. Prabha","doi":"10.1109/ICGHPC.2013.6533931","DOIUrl":null,"url":null,"abstract":"USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N. which is a routing protocol that has the knowledge of its best route alone - no single node has all the data. This technique eliminates extending the information to the concerning network changes to every node in the network. Each node only maintains the best hop details not the entire network topology. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.","PeriodicalId":119498,"journal":{"name":"2013 International Conference on Green High Performance Computing (ICGHPC)","volume":"59 17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"UOSPR: UnObservable secure proactive routing protocol for fast and secure transmission using B.A.T.M.A.N\",\"authors\":\"S. Balaji, M. Prabha\",\"doi\":\"10.1109/ICGHPC.2013.6533931\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N. which is a routing protocol that has the knowledge of its best route alone - no single node has all the data. This technique eliminates extending the information to the concerning network changes to every node in the network. Each node only maintains the best hop details not the entire network topology. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.\",\"PeriodicalId\":119498,\"journal\":{\"name\":\"2013 International Conference on Green High Performance Computing (ICGHPC)\",\"volume\":\"59 17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Green High Performance Computing (ICGHPC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGHPC.2013.6533931\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Green High Performance Computing (ICGHPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGHPC.2013.6533931","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

USOR通过组合组签名和基于id的加密进行路由发现,处理了不可链接性、不可观察性和匿名性的概念。在传输中,除了安全性之外,还有一个要求是数据的有效和高效的传递。USOR使用普通的距离计算来获得关于邻居节点的知识。同时,我们不能将整个网络的信息整合到单个节点或每个节点中。我们知道,自组织网络中的节点存储和电池电量有限。已经有一半的电力用于安全,剩余的电力必须用于计算路线和数据传输。为此,我们将上述USOR与更好的移动自组织网络方法(Better Approach To Mobile Ad-hoc Networking,简称b.a.t.m.a.n)合并在一起。b.a.t.m.a.n是一种路由协议,它只知道最佳路由——没有一个节点拥有所有数据。这种技术避免了将有关网络更改的信息扩展到网络中的每个节点。每个节点只维护最佳跳的详细信息,而不是整个网络拓扑。由此,我们以最小的节点故障率以安全的方式实现了数据的快速传输。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
UOSPR: UnObservable secure proactive routing protocol for fast and secure transmission using B.A.T.M.A.N
USOR deals with the concept of unlinkability, unobservability and anonymity by combining group signature and ID-based encryption for route discovery. Apart from the security, there is another requirement in transmission is effective and efficient delivery of data. USOR uses ordinary distance calculations to get the knowledge about neighbour nodes. At the same time we can't incorporate the entire information about the network into single node or every node. We know that nodes in ad-hoc network have limited storage and battery power. Already half of the power vested in security, remaining power has to be used for calculating routes and data transmission. For that we are merging the above USOR with Better Approach To Mobile Ad-hoc Networking, or B.A.T.M.A.N. which is a routing protocol that has the knowledge of its best route alone - no single node has all the data. This technique eliminates extending the information to the concerning network changes to every node in the network. Each node only maintains the best hop details not the entire network topology. From this we are achieving fast transmission of data in a secure way with minimum node failure rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Efficient classification of portscan attacks using Support Vector Machine Enhancing the performance in cognitive network Portable monopulse tracking receiver Fuzzy ARTMAP based feature classification for danger and safety zone prediction for toddlers using wearable electrodes Preserving national animal using wireless sensor network based hotspot algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1