Loading…
Implementation and Evaluation of ISDSR in Emulation Environments
Secure wireless routing protocols which use an authentication mechanism, such as digital signatures, prevent attacks whereby an attacker injects fake data in the route information in the process of establishing a route. In this paper, we focus on a multi-hop secure routing protocol called ISDSR, whi...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Shimizu, Shinnosuke Kojima, Hideharu Yanai, Naoto Tsuchiya, Tatsuhiro |
description | Secure wireless routing protocols which use an authentication mechanism, such as digital signatures, prevent attacks whereby an attacker injects fake data in the route information in the process of establishing a route. In this paper, we focus on a multi-hop secure routing protocol called ISDSR, which is a secure variant of DSR with ID-based sequential aggregate signatures. ISDSR guarantees the correctness of route information that contains a collection of nodes that constitute a travel path of a received packet. Analytic results on the performance of this protocol were provided in previous work; but the performance in a practical situation has not been investigated so far. In this work, we present the results of our experiments using two types of emulation environments where the network are formed with nine to 100 nodes. The results show that ISDSR is superior to the RSA-based secure routing protocol with respect to packet loss rate. |
doi_str_mv | 10.1109/WCNC.2019.8885647 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8885647</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8885647</ieee_id><sourcerecordid>8885647</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-4b83a04db687207011c5077f062d01d9af32397eb6ca7325ed3e2daa0b33d3cf3</originalsourceid><addsrcrecordid>eNotj81Kw0AUhUdBsNY-gLjJCyTeuXf-slNiqoGiYBWXZZKZwEgyKUla8O1F2tXhfHA-OIzdccg4h_zhu3grMgSeZ8YYqYS-YKtcGy7JKK2Ewku24FKaFBXHa3YzTT8ACFKIBXus-n3nex9nO4chJja6pDza7nCqQ5tU2-ftRxJiUvaH7kTLeAzjEP9X0y27am03-dU5l-xrXX4Wr-nm_aUqnjZpQKA5FbUhC8LVymgEDZw3ErRuQaED7nLbElKufa0aqwmld-TRWQs1kaOmpSW7P3mD9363H0Nvx9_d-TD9Aa_cSUg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Implementation and Evaluation of ISDSR in Emulation Environments</title><source>IEEE Xplore All Conference Series</source><creator>Shimizu, Shinnosuke ; Kojima, Hideharu ; Yanai, Naoto ; Tsuchiya, Tatsuhiro</creator><creatorcontrib>Shimizu, Shinnosuke ; Kojima, Hideharu ; Yanai, Naoto ; Tsuchiya, Tatsuhiro</creatorcontrib><description>Secure wireless routing protocols which use an authentication mechanism, such as digital signatures, prevent attacks whereby an attacker injects fake data in the route information in the process of establishing a route. In this paper, we focus on a multi-hop secure routing protocol called ISDSR, which is a secure variant of DSR with ID-based sequential aggregate signatures. ISDSR guarantees the correctness of route information that contains a collection of nodes that constitute a travel path of a received packet. Analytic results on the performance of this protocol were provided in previous work; but the performance in a practical situation has not been investigated so far. In this work, we present the results of our experiments using two types of emulation environments where the network are formed with nine to 100 nodes. The results show that ISDSR is superior to the RSA-based secure routing protocol with respect to packet loss rate.</description><identifier>EISSN: 1558-2612</identifier><identifier>EISBN: 9781538676462</identifier><identifier>EISBN: 153867646X</identifier><identifier>DOI: 10.1109/WCNC.2019.8885647</identifier><language>eng</language><publisher>IEEE</publisher><subject>Aggregates ; Digital signatures ; emulation ; performance evaluation ; Public key ; Routing protocols ; secure routing protocols ; Wireless sensor networks</subject><ispartof>2019 IEEE Wireless Communications and Networking Conference (WCNC), 2019, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8885647$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8885647$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shimizu, Shinnosuke</creatorcontrib><creatorcontrib>Kojima, Hideharu</creatorcontrib><creatorcontrib>Yanai, Naoto</creatorcontrib><creatorcontrib>Tsuchiya, Tatsuhiro</creatorcontrib><title>Implementation and Evaluation of ISDSR in Emulation Environments</title><title>2019 IEEE Wireless Communications and Networking Conference (WCNC)</title><addtitle>WCNC</addtitle><description>Secure wireless routing protocols which use an authentication mechanism, such as digital signatures, prevent attacks whereby an attacker injects fake data in the route information in the process of establishing a route. In this paper, we focus on a multi-hop secure routing protocol called ISDSR, which is a secure variant of DSR with ID-based sequential aggregate signatures. ISDSR guarantees the correctness of route information that contains a collection of nodes that constitute a travel path of a received packet. Analytic results on the performance of this protocol were provided in previous work; but the performance in a practical situation has not been investigated so far. In this work, we present the results of our experiments using two types of emulation environments where the network are formed with nine to 100 nodes. The results show that ISDSR is superior to the RSA-based secure routing protocol with respect to packet loss rate.</description><subject>Aggregates</subject><subject>Digital signatures</subject><subject>emulation</subject><subject>performance evaluation</subject><subject>Public key</subject><subject>Routing protocols</subject><subject>secure routing protocols</subject><subject>Wireless sensor networks</subject><issn>1558-2612</issn><isbn>9781538676462</isbn><isbn>153867646X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81Kw0AUhUdBsNY-gLjJCyTeuXf-slNiqoGiYBWXZZKZwEgyKUla8O1F2tXhfHA-OIzdccg4h_zhu3grMgSeZ8YYqYS-YKtcGy7JKK2Ewku24FKaFBXHa3YzTT8ACFKIBXus-n3nex9nO4chJja6pDza7nCqQ5tU2-ftRxJiUvaH7kTLeAzjEP9X0y27am03-dU5l-xrXX4Wr-nm_aUqnjZpQKA5FbUhC8LVymgEDZw3ErRuQaED7nLbElKufa0aqwmld-TRWQs1kaOmpSW7P3mD9363H0Nvx9_d-TD9Aa_cSUg</recordid><startdate>201904</startdate><enddate>201904</enddate><creator>Shimizu, Shinnosuke</creator><creator>Kojima, Hideharu</creator><creator>Yanai, Naoto</creator><creator>Tsuchiya, Tatsuhiro</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201904</creationdate><title>Implementation and Evaluation of ISDSR in Emulation Environments</title><author>Shimizu, Shinnosuke ; Kojima, Hideharu ; Yanai, Naoto ; Tsuchiya, Tatsuhiro</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-4b83a04db687207011c5077f062d01d9af32397eb6ca7325ed3e2daa0b33d3cf3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Aggregates</topic><topic>Digital signatures</topic><topic>emulation</topic><topic>performance evaluation</topic><topic>Public key</topic><topic>Routing protocols</topic><topic>secure routing protocols</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Shimizu, Shinnosuke</creatorcontrib><creatorcontrib>Kojima, Hideharu</creatorcontrib><creatorcontrib>Yanai, Naoto</creatorcontrib><creatorcontrib>Tsuchiya, Tatsuhiro</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shimizu, Shinnosuke</au><au>Kojima, Hideharu</au><au>Yanai, Naoto</au><au>Tsuchiya, Tatsuhiro</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Implementation and Evaluation of ISDSR in Emulation Environments</atitle><btitle>2019 IEEE Wireless Communications and Networking Conference (WCNC)</btitle><stitle>WCNC</stitle><date>2019-04</date><risdate>2019</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eissn>1558-2612</eissn><eisbn>9781538676462</eisbn><eisbn>153867646X</eisbn><abstract>Secure wireless routing protocols which use an authentication mechanism, such as digital signatures, prevent attacks whereby an attacker injects fake data in the route information in the process of establishing a route. In this paper, we focus on a multi-hop secure routing protocol called ISDSR, which is a secure variant of DSR with ID-based sequential aggregate signatures. ISDSR guarantees the correctness of route information that contains a collection of nodes that constitute a travel path of a received packet. Analytic results on the performance of this protocol were provided in previous work; but the performance in a practical situation has not been investigated so far. In this work, we present the results of our experiments using two types of emulation environments where the network are formed with nine to 100 nodes. The results show that ISDSR is superior to the RSA-based secure routing protocol with respect to packet loss rate.</abstract><pub>IEEE</pub><doi>10.1109/WCNC.2019.8885647</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 1558-2612 |
ispartof | 2019 IEEE Wireless Communications and Networking Conference (WCNC), 2019, p.1-6 |
issn | 1558-2612 |
language | eng |
recordid | cdi_ieee_primary_8885647 |
source | IEEE Xplore All Conference Series |
subjects | Aggregates Digital signatures emulation performance evaluation Public key Routing protocols secure routing protocols Wireless sensor networks |
title | Implementation and Evaluation of ISDSR in Emulation Environments |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T03%3A42%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Implementation%20and%20Evaluation%20of%20ISDSR%20in%20Emulation%20Environments&rft.btitle=2019%20IEEE%20Wireless%20Communications%20and%20Networking%20Conference%20(WCNC)&rft.au=Shimizu,%20Shinnosuke&rft.date=2019-04&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.eissn=1558-2612&rft_id=info:doi/10.1109/WCNC.2019.8885647&rft.eisbn=9781538676462&rft.eisbn_list=153867646X&rft_dat=%3Cieee_CHZPO%3E8885647%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-4b83a04db687207011c5077f062d01d9af32397eb6ca7325ed3e2daa0b33d3cf3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8885647&rfr_iscdi=true |