Mobil Ad Hoc Networks Protocol Design Part 13

Tham khảo tài liệu 'mobil ad hoc networks protocol design part 13', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | 472 Mobile Ad-Hoc Networks Protocol Design AODV is adapted as the default routing protocol in this dynamic encryption model for the ad-hoc networking because of its high performance and low overhead which are very important when considering that bandwidth is very limited in wireless communication. In AODV as shown in Fig. 1. above the source node first broadcasts a route request RREQ message to all adjacent nodes and waits for the corresponding route reply RREP message from the destination node to establish routing information. This request and reply query cycle will continue as long as this particular path is not listed in the routing table. Once routes have been built from source to destination they will continue to be maintained as long as they are needed by the source node. All wireless packets between these two parties will follow the pre-build routing information and will be forwarded node by node until they reach the final destination. When the communication ends the links will time out and eventually be removed from the table to release space for other routing paths. i-key protocol procedures This i-key protocol is primarily based on a dynamic re-keying mechanism that ensures the privacy of communication and prevents unauthorized users from accessing protected data over wireless communication. The key management and cipher stream system in i-key architecture is similar to Temporal Key Integrity Protocol TKIP used in WPA WPA2 and RC4 used in Wired Equivalent Privacy WEP Lansford Bahl 2000 in which each encryption key contains a pre-shared key PSK and a randomly selected key value from the Initialization Vector IV pool. In addition to these two keys an extra dynamic secret i-key is applied to the cipher stream that is used to encrypt every data packet before transmission. Fig. 2. illustrates the key stream that is combined with these three different keys and the block diagram of i-key encryption and decryption algorithm. The dynamic i-key is generated .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.