移动Ad-hoc网络安全按需路由协议的性能评估

J. Arshad, M. A. Azad
{"title":"移动Ad-hoc网络安全按需路由协议的性能评估","authors":"J. Arshad, M. A. Azad","doi":"10.1109/SAHCN.2006.288591","DOIUrl":null,"url":null,"abstract":"With the passage of time and increase in the need for mobility wireless or mobile networks emerged to replace the wired networks. This new generation of networks is different from the earlier one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. These networks are bandwidth and resource constrained with no network infrastructure and dedicated routing devices. Moreover, every node in such networks has to take care of its routing module itself. These characteristics become reasons for the importance of security in mobile ad-hoc networks as there is very high probability of attacks in such networks. Some work has been done to compare different protocols on basis of security but keeping in view the resource limitations in such networks, evaluation based on networking context is also important. We evaluate the overall performance overhead associated with secure routing protocols for mobile ad-hoc networks (MANETs). We implement the secure ad-hoc on-demand distance vector routing protocol (SAODV) extensions with AODV in the network simulator 2 (NS-2) and use the Monarch project implementation of Ariadne for our evaluation purpose. We try to figure out the amount of extra work a mobile node has to do in order to operate securely","PeriodicalId":58925,"journal":{"name":"Digital Communications and Networks","volume":"27 1","pages":"971-975"},"PeriodicalIF":0.0000,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"49","resultStr":"{\"title\":\"Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks\",\"authors\":\"J. Arshad, M. A. Azad\",\"doi\":\"10.1109/SAHCN.2006.288591\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the passage of time and increase in the need for mobility wireless or mobile networks emerged to replace the wired networks. This new generation of networks is different from the earlier one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. These networks are bandwidth and resource constrained with no network infrastructure and dedicated routing devices. Moreover, every node in such networks has to take care of its routing module itself. These characteristics become reasons for the importance of security in mobile ad-hoc networks as there is very high probability of attacks in such networks. Some work has been done to compare different protocols on basis of security but keeping in view the resource limitations in such networks, evaluation based on networking context is also important. We evaluate the overall performance overhead associated with secure routing protocols for mobile ad-hoc networks (MANETs). We implement the secure ad-hoc on-demand distance vector routing protocol (SAODV) extensions with AODV in the network simulator 2 (NS-2) and use the Monarch project implementation of Ariadne for our evaluation purpose. We try to figure out the amount of extra work a mobile node has to do in order to operate securely\",\"PeriodicalId\":58925,\"journal\":{\"name\":\"Digital Communications and Networks\",\"volume\":\"27 1\",\"pages\":\"971-975\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"49\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Digital Communications and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAHCN.2006.288591\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Communications and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAHCN.2006.288591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 49

摘要

随着时间的推移和移动需求的增加,无线或移动网络应运而生,以取代有线网络。新一代网络在网络基础设施、网络资源、路由协议、路由设备等方面与上一代网络有很大的不同。这些网络带宽和资源有限,没有网络基础设施和专用路由设备。此外,这种网络中的每个节点都必须自己负责路由模块。这些特点使得移动自组网的安全性变得非常重要,因为在这种网络中攻击的概率非常高。已经做了一些工作来比较基于安全性的不同协议,但考虑到此类网络中的资源限制,基于网络环境的评估也很重要。我们评估了与移动自组织网络(manet)的安全路由协议相关的总体性能开销。我们在网络模拟器2 (NS-2)中使用AODV实现了安全的ad-hoc按需距离矢量路由协议(SAODV)扩展,并使用Ariadne的君主项目实现来进行评估。我们试图计算出移动节点为了安全运行而必须做的额外工作量
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Performance Evaluation of Secure on-Demand Routing Protocols for Mobile Ad-hoc Networks
With the passage of time and increase in the need for mobility wireless or mobile networks emerged to replace the wired networks. This new generation of networks is different from the earlier one in many aspects like network infrastructure, resources and routing protocols, routing devices etc. These networks are bandwidth and resource constrained with no network infrastructure and dedicated routing devices. Moreover, every node in such networks has to take care of its routing module itself. These characteristics become reasons for the importance of security in mobile ad-hoc networks as there is very high probability of attacks in such networks. Some work has been done to compare different protocols on basis of security but keeping in view the resource limitations in such networks, evaluation based on networking context is also important. We evaluate the overall performance overhead associated with secure routing protocols for mobile ad-hoc networks (MANETs). We implement the secure ad-hoc on-demand distance vector routing protocol (SAODV) extensions with AODV in the network simulator 2 (NS-2) and use the Monarch project implementation of Ariadne for our evaluation purpose. We try to figure out the amount of extra work a mobile node has to do in order to operate securely
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
158
期刊最新文献
A fast and accurate multi-keyword sorted searchable scheme based on blockchain Perceptual point cloud qality assessment for immersive metaverse experience A hierarchical blockchain-enabled distributed federated learning system with model-contribution based rewarding Nondestructive detection and classification of impurities-containing seed cotton based on hyperspectral imaging and one-dimensional convolutional neural network Adaptor signature based on randomized EdDSA in blockchain
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1