{"title":"Performance analysis of FTDSR and AOTDV trust based routing protocols","authors":"Hema R. Karande, S. Thorat","doi":"10.1109/WOCN.2014.6923064","DOIUrl":null,"url":null,"abstract":"Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing so, these protocols need a number of rudiments in both the network establishment and operation phases. In contrast, by observing the honesty in participation by other nodes, trust-based routing protocols discover trusted rather than secure routes in the network. These protocols thus allow rapid deployment along with a vigorously adaptive operation, which conforms to the present network situation. In this paper, we conduct the performance evaluation of four reactive routing protocols in a network with varying speed, network dimension and number of malicious nodes. With the help of comprehensive simulations, we demonstrate that the performance of these protocols is analyzed using Packet delivery ratio, Throughput, End-to-End Delay and Routing Load under similar attacks, traffic, and mobility conditions. However, each routing protocol has its own peculiar advantage making it suitable for application in a particular unplanned environment.","PeriodicalId":149158,"journal":{"name":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCN.2014.6923064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Ad hoc networks, due to their spontaneous nature, are frequently established in insecure environments and hence become prone to attacks. These attacks are due to the participation of malicious nodes in the network. Routing protocols are a common target of these nodes. A variety of secure routing protocols have been proposed, that make routes secure using cryptographic algorithms. However, in doing so, these protocols need a number of rudiments in both the network establishment and operation phases. In contrast, by observing the honesty in participation by other nodes, trust-based routing protocols discover trusted rather than secure routes in the network. These protocols thus allow rapid deployment along with a vigorously adaptive operation, which conforms to the present network situation. In this paper, we conduct the performance evaluation of four reactive routing protocols in a network with varying speed, network dimension and number of malicious nodes. With the help of comprehensive simulations, we demonstrate that the performance of these protocols is analyzed using Packet delivery ratio, Throughput, End-to-End Delay and Routing Load under similar attacks, traffic, and mobility conditions. However, each routing protocol has its own peculiar advantage making it suitable for application in a particular unplanned environment.