PENG Chang-Yan, ZHANG Quan, TANG Chao-Jing. A Secure On-Demand Routing Protocol for LEO Satellite Networks[J]. JOURNAL OF SIGNAL PROCESSING, 2010, 26(3): 337-346.
Citation: PENG Chang-Yan, ZHANG Quan, TANG Chao-Jing. A Secure On-Demand Routing Protocol for LEO Satellite Networks[J]. JOURNAL OF SIGNAL PROCESSING, 2010, 26(3): 337-346.

A Secure On-Demand Routing Protocol for LEO Satellite Networks

More Information
  • Received Date: March 31, 2009
  • Published Date: March 24, 2010
  • Research on routing in Low Earth Orbit Satellite Networks is a hotspot in areas of satellite communications, and how to secure routing algorithms has been attached increasing importance. After a terse analysis of security threats faced by on-demand routing protocols for satellite networks, a secure on-demand routing protocol is presented, which is on the basis of identity-based signcryption schemes and fit for the features of satellite network topology. According to the protocol’s characteristic of heavy time overhead in processing crypto algorithms, a mechanism called delayed verification with adaptive probability is designed for decreasing route discovery time. Security analysis and simulation experiments show that the proposed protocol can resist typical outside attacks and guarantee steady packet delivery ratio at the cost of finite increase in route discovery time and route overhead.
  • Related Articles

    [1]HAN Huizhu, HUANG Yangchao, HU Hang, PAN Yu, AN Qi, ZHAO Senhao. Security Performance Analysis Based on NOMA Transmission in UAV Short Packet Communication[J]. JOURNAL OF SIGNAL PROCESSING, 2022, 38(12): 2582-2593. DOI: 10.16798/j.issn.1003-0530.2022.12.013
    [2]Zhang Xueru, Ji Baofeng, Song Kang, Shen Sen, Li Chunguo. Performance analysis of IoV secure transmission based on DF relay cooperation[J]. JOURNAL OF SIGNAL PROCESSING, 2020, 36(5): 723-732. DOI: 10.16798/j.issn.1003-0530.2020.05.011
    [3]YUAN Yan-xin, SUN Li, ZHANG Qun. Human Gait Recognition Based on Convolution Neural  Network and Micro-motion Feature#br#[J]. JOURNAL OF SIGNAL PROCESSING, 2018, 34(5): 602-609. DOI: 10.16798/j.issn.1003-0530.2018.05.012
    [4]QI Xiao-gang, DONG Hai-jun. An Opportunity Routing Algorithm Based on Hibernation for Relay Node Selection in Wireless Sensor Networks[J]. JOURNAL OF SIGNAL PROCESSING, 2017, 33(3A): 58-64. DOI: 10.16798/j.issn.1003-0530.2017.3A.010
    [5]LUO Cheng, HUANG Long-Sheng, XIE Wei-Xin, ZHANG Qin-Yu. Differentiated Services Multipath Qos Routing protocol in Sensor Networks[J]. JOURNAL OF SIGNAL PROCESSING, 2015, 31(12): 1605-1611.
    [6]CAO Yu, TU Ling, WU Li-Fang. Face Liveness Detection using Gray Level Co-Occurrence Matrix and Wavelets Analysis in Identity Authentication[J]. JOURNAL OF SIGNAL PROCESSING, 2014, 30(7): 830-835.
    [7]ZHAO Fang-Yuan, HAN Chang-Cai, LI Yuan. Cooperative Routing Algorithm based on DSDV to Maximize the Throughput for Wireless Networks[J]. JOURNAL OF SIGNAL PROCESSING, 2013, 29(4): 480-485.
    [8]SHI Lei, WU Ren-Biao. Multi-route mid-term conflict detection algorithm based on discretization of predicted position space[J]. JOURNAL OF SIGNAL PROCESSING, 2012, 28(11): 1521-1528.
    [9]CAI Qing-Ling, ZHAN Yi-Ju, LIU Yang, YANG Jian. Security Model for RFID Communication Protocol Based on Password  Authenticated with Provable Security[J]. JOURNAL OF SIGNAL PROCESSING, 2010, 26(9): 1318-1322.
    [10]HAN Yu-Jie, YANG Lu-Xi. Routing Selection Algorithm with Optimal Power Allocation For MIMO Relay Cooperation Networks[J]. JOURNAL OF SIGNAL PROCESSING, 2010, 26(1): 80-85.

Catalog

    Article Metrics

    Article views (703) PDF downloads (1452) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return