1,678 research outputs found
Performance Analysis of TS-AODV and MTS-AODV Routing Protocols in MANET
A Mobile Ad-hoc Network (MANET) is a group of wireless nodes that are communicating with each other within radio range without help of infrastructure based or any centralized administration. As the nodes are mobile so topology changes frequently that leads to link failure and lack of infrastructure support and resource constraint is the key issue that causes dishonest and non co-operative nodes. There are finding a route to destination, new route discovery is initiated. The frequent discoveries lead to more network congestion. To avoid this multipath routing protocols have been proposed to find multiple routes to destination and switch on to alternate secondary path in case of route broken and its provide better routing performance and security. In this technical research paper attempt to compare the performance of two reactive routing protocols for MANETs that is Trusted Secure Ad-hoc On-Demand Distance Vector (TS-AODV) and Modified Trusted Secure Ad-hoc On-Demand Distance Vector (MTS-AODV). TS-AODV is on-demand gateway discovery protocol where a mobile device of MANET gets connected to gateway. MTS-AODV is based on the node routing behaviour and identifying the attacks such as flooding, black hole, gray hole and denial of service attacks in MANET. MTS-AODV using the Intrusion Detection system (IDS) and trust based routing, the performance results are analysed by varying simulation time. Furthermore, all the above mentioned protocols are compared based on several important performance metrics which are packet delivery ratio, end-to-end delay and average energy
TRUST BASED SECURE AODV IN MANET
Abstract- The nature of self-organization and the limitation of individual resources, MANET always confront security and selfishness issues. In this thesis, we design trusted routing protocols using trusted frame works and intrusion detection system (secure protocol) f or MANET. Trust combination algorithms and trust mapping functions are provided in this model, where the former can aggregate different opinions together to get a new recommendation opinion. Based on this trust model, we design our trusted routing protocols for MANET called TAODV on top of Ad Hoc On-demand Distance Vector (AODV) routing protocol. We extend the routing table and the routing messages of ADOV with trust information which can be updated directly through monitoring in the neighborhood. When performing trusted routing discovery, unlike those cryptographic schemes that perform signature generation or verification at every routing packet, we just combine the recommen ded opinions together and make a routing judgment based on each element of the new opinion. In this way the computation overhead can be largely reduced, and the trustworthiness of the routing procedure can be guaranteed as well. In this thesis, we implement the security and sel fishness issues of wireless networks, either in non-cooperative form or in cooperative form. Our results show that the cumulative utilities of cooperative nodes are increased steadily and the selfish nodes cannot get more utilities by behaving selfishly than cooperatively
Design & Evaluation of Path-based Reputation System for MANET Routing
Most of the existing reputation systems in mobile ad hoc networks (MANET) consider only node reputations when selecting routes. Reputation and trust are therefore generally ensured within a one-hop distance when routing decisions are made, which often fail to provide the most reliable, trusted route. In this report, we first summarize the background studies on the security of MANET. Then, we propose a system that is based on path reputation, which is computed from reputation and trust values of each and every node in the route. The use of path reputation greatly enhances the reliability of resulting routes. The detailed system architecture and components design of the proposed mechanism are carefully described on top of the AODV (Ad-hoc On-demand Distance Vector) routing protocol. We also evaluate the performance of the proposed system by simulating it on top of AODV. Simulation experiments show that the proposed scheme greatly improves network throughput in the midst of misbehavior nodes while requires very limited message overhead. To our knowledge, this is the first path-based reputation system proposal that may be implemented on top of a non-source based routing scheme such as AODV
Recommended from our members
A two‐step authentication framework for Mobile ad hoc networks
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted. An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message. In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed. Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
- …