Performance analysis of FTDSR and AOTDV trust based routing protocols

Hema R. Karande, S. Thorat
{"title":"Performance analysis of FTDSR and AOTDV trust based routing protocols","authors":"Hema R. Karande, S. Thorat","doi":"10.1109/WOCN.2014.6923064","DOIUrl":null,"url":null,"abstract":"Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing so, these protocols need a number of rudiments in both the network establishment and operation phases. In contrast, by observing the honesty in participation by other nodes, trust-based routing protocols discover trusted rather than secure routes in the network. These protocols thus allow rapid deployment along with a vigorously adaptive operation, which conforms to the present network situation. In this paper, we conduct the performance evaluation of four reactive routing protocols in a network with varying speed, network dimension and number of malicious nodes. With the help of comprehensive simulations, we demonstrate that the performance of these protocols is analyzed using Packet delivery ratio, Throughput, End-to-End Delay and Routing Load under similar attacks, traffic, and mobility conditions. However, each routing protocol has its own peculiar advantage making it suitable for application in a particular unplanned environment.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2014.6923064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing so, these protocols need a number of rudiments in both the network establishment and operation phases. In contrast, by observing the honesty in participation by other nodes, trust-based routing protocols discover trusted rather than secure routes in the network. These protocols thus allow rapid deployment along with a vigorously adaptive operation, which conforms to the present network situation. In this paper, we conduct the performance evaluation of four reactive routing protocols in a network with varying speed, network dimension and number of malicious nodes. With the help of comprehensive simulations, we demonstrate that the performance of these protocols is analyzed using Packet delivery ratio, Throughput, End-to-End Delay and Routing Load under similar attacks, traffic, and mobility conditions. However, each routing protocol has its own peculiar advantage making it suitable for application in a particular unplanned environment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于FTDSR和AOTDV信任的路由协议性能分析
自组织网络由于其自发性质,经常建立在不安全的环境中,因此容易受到攻击。这些攻击是由于网络中恶意节点的参与。路由协议是这些节点的共同目标。人们提出了各种安全路由协议,这些协议使用加密算法使路由安全。然而,在这样做的过程中,这些协议在网络建立和运行阶段都需要一些基础知识。相比之下,基于信任的路由协议通过观察其他节点参与的诚实性,发现网络中的可信路由,而不是安全路由。因此,这些协议可以快速部署,并具有强大的自适应操作,符合当前的网络情况。在本文中,我们在不同速度、网络维度和恶意节点数量的网络中对四种响应路由协议进行了性能评估。在综合仿真的帮助下,我们证明了在类似的攻击、流量和移动条件下,使用分组投递率、吞吐量、端到端延迟和路由负载来分析这些协议的性能。然而,每种路由协议都有其独特的优势,使其适合在特定的非计划环境中应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The mobile-cloud computing (MCC) roadblocks Efficient battery management in wireless sensor node: Review paper Design of Vivaldi like antenna using fourier series approach A novel approach for power reduction in asynchronous circuits by using AFPT Performance analysis of SC MIMO-CDMA system using STBC codes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1