{"title":"基于模糊可信自组织的MANET按需距离矢量路由协议","authors":"J. Manickam, S. Shanmugavel","doi":"10.1109/WIMOB.2007.36","DOIUrl":null,"url":null,"abstract":"Ad hoc networks are frequently established in insecure environments and hence become susceptible to attacks. A number of recently proposed secure routing protocols entail a number of prerequisites during both the network establishment and operation phases as they employ cryptographic algorithms. In contrast, trust-based routing protocols locate trusted routes and permit rapid deployment along with a dynamically adaptive operation, which conforms with the current network situation. In this paper, we evaluate the performance of our proposed Fuzzy based Trusted AODV routing protocol in a network, with varying number of malicious nodes. With the help of simulations, we demonstrate that the performance of the proposed protocol is better than AODV in terms of routing overhead ratio, throughput, latency and packet loss under similar attack conditions.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"51","resultStr":"{\"title\":\"Fuzzy Based Trusted Ad hoc On-demand Distance Vector Routing Protocol for MANET\",\"authors\":\"J. Manickam, S. Shanmugavel\",\"doi\":\"10.1109/WIMOB.2007.36\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad hoc networks are frequently established in insecure environments and hence become susceptible to attacks. A number of recently proposed secure routing protocols entail a number of prerequisites during both the network establishment and operation phases as they employ cryptographic algorithms. In contrast, trust-based routing protocols locate trusted routes and permit rapid deployment along with a dynamically adaptive operation, which conforms with the current network situation. In this paper, we evaluate the performance of our proposed Fuzzy based Trusted AODV routing protocol in a network, with varying number of malicious nodes. With the help of simulations, we demonstrate that the performance of the proposed protocol is better than AODV in terms of routing overhead ratio, throughput, latency and packet loss under similar attack conditions.\",\"PeriodicalId\":185608,\"journal\":{\"name\":\"15th International Conference on Advanced Computing and Communications (ADCOM 2007)\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-10-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"51\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"15th International Conference on Advanced Computing and Communications (ADCOM 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WIMOB.2007.36\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIMOB.2007.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fuzzy Based Trusted Ad hoc On-demand Distance Vector Routing Protocol for MANET
Ad hoc networks are frequently established in insecure environments and hence become susceptible to attacks. A number of recently proposed secure routing protocols entail a number of prerequisites during both the network establishment and operation phases as they employ cryptographic algorithms. In contrast, trust-based routing protocols locate trusted routes and permit rapid deployment along with a dynamically adaptive operation, which conforms with the current network situation. In this paper, we evaluate the performance of our proposed Fuzzy based Trusted AODV routing protocol in a network, with varying number of malicious nodes. With the help of simulations, we demonstrate that the performance of the proposed protocol is better than AODV in terms of routing overhead ratio, throughput, latency and packet loss under similar attack conditions.