Performance analysis of FTDSR and AOTDV trust based routing protocols

Hema R. Karande, S. Thorat
{"title":"Performance analysis of FTDSR and AOTDV trust based routing protocols","authors":"Hema R. Karande, S. Thorat","doi":"10.1109/WOCN.2014.6923064","DOIUrl":null,"url":null,"abstract":"Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing so, these protocols need a number of rudiments in both the network establishment and operation phases. In contrast, by observing the honesty in participation by other nodes, trust-based routing protocols discover trusted rather than secure routes in the network. These protocols thus allow rapid deployment along with a vigorously adaptive operation, which conforms to the present network situation. In this paper, we conduct the performance evaluation of four reactive routing protocols in a network with varying speed, network dimension and number of malicious nodes. With the help of comprehensive simulations, we demonstrate that the performance of these protocols is analyzed using Packet delivery ratio, Throughput, End-to-End Delay and Routing Load under similar attacks, traffic, and mobility conditions. However, each routing protocol has its own peculiar advantage making it suitable for application in a particular unplanned environment.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2014.6923064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing so, these protocols need a number of rudiments in both the network establishment and operation phases. In contrast, by observing the honesty in participation by other nodes, trust-based routing protocols discover trusted rather than secure routes in the network. These protocols thus allow rapid deployment along with a vigorously adaptive operation, which conforms to the present network situation. In this paper, we conduct the performance evaluation of four reactive routing protocols in a network with varying speed, network dimension and number of malicious nodes. With the help of comprehensive simulations, we demonstrate that the performance of these protocols is analyzed using Packet delivery ratio, Throughput, End-to-End Delay and Routing Load under similar attacks, traffic, and mobility conditions. However, each routing protocol has its own peculiar advantage making it suitable for application in a particular unplanned environment.
基于FTDSR和AOTDV信任的路由协议性能分析
自组织网络由于其自发性质,经常建立在不安全的环境中,因此容易受到攻击。这些攻击是由于网络中恶意节点的参与。路由协议是这些节点的共同目标。人们提出了各种安全路由协议,这些协议使用加密算法使路由安全。然而,在这样做的过程中,这些协议在网络建立和运行阶段都需要一些基础知识。相比之下,基于信任的路由协议通过观察其他节点参与的诚实性,发现网络中的可信路由,而不是安全路由。因此,这些协议可以快速部署,并具有强大的自适应操作,符合当前的网络情况。在本文中,我们在不同速度、网络维度和恶意节点数量的网络中对四种响应路由协议进行了性能评估。在综合仿真的帮助下,我们证明了在类似的攻击、流量和移动条件下,使用分组投递率、吞吐量、端到端延迟和路由负载来分析这些协议的性能。然而,每种路由协议都有其独特的优势,使其适合在特定的非计划环境中应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信