ASIA unversity:Item 310904400/108619
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 94286/110023 (86%)
Visitors : 21671070      Online Users : 645
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/108619


    Title: TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks
    Authors: 陳興忠;Hsing-Chung Chen
    Contributors: 資訊工程學系
    Date: 2017-06
    Issue Date: 2017-12-08 06:47:57 (UTC+0)
    Abstract: In recent years, threats in wireless ad hoc networks (WANETs) could be further divided into outside and insider threats. It is important to consider that the majority of insider threats come from the users who are fully authorized to use the systems they are accessing. This new situation would greatly inhibit the normal activity for data communications, and cause the WANETs to spend a longer time for delivering the same data volumes. Therefore, a Trust-Based Cooperation Authentication Bit-Map Routing Protocol (TCABRP) against insider threats in WANETs is proposed in this paper. It could reduce the damages away from the insider threats in a WANET. Specifically, the cooperation evaluations are employed that include three factors: cooperative scores, cooperative trust values and authenticated codes. The routing protocol is not only a type of behavioral-based technique but also a kind of efficient cryptographic protocol. The cooperative evaluations route vector could protect the chain of the router vector authentication codes for verifying the delivery process and determining whether it is correct or incorrect. Moreover, the proposed routing protocol in WANET could not only prevent InTs efficiently, but also evaluate the behaviors of the compromised node or a selfish node as well.
    Relation: IEEE Systems Journal
    Appears in Collections:[Department of Computer Science and Information Engineering] Journal Artical

    Files in This Item:

    File SizeFormat
    index.html0KbHTML378View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback