Fuzzy based Trusted Ad hoc On-demand Distance Vector Routing Protocol for MANET

被引:0
作者
Manickam, J. Martin Leo [1 ]
Shanmugavel, S. [1 ]
机构
[1] Anna Univ, Madras 600025, Tamil Nadu, India
来源
THIRD IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS - WIMOB 2007 | 2007年
关键词
mobile networking; MANET; security; trust; routing protocol; fuzzy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are frequently established in insecure environments and hence become susceptible to attacks. A number of recently proposed secure routing protocols entail a number of prerequisites during both the network establishment and operation phases as they employ cryptographic algorithms. In contrast, trust-based routing protocols locate trusted routes and permit rapid deployment along with a dynamically adaptive operation, which conforms with the current network situation. In this paper, we evaluate the performance of our proposed Fuzzy based Trusted AODV routing protocol in a network, with varying number of malicious nodes. With the help of simulations, we demonstrate that the performance of the proposed protocol is better than AODV in terms of routing overhead ratio, throughput, latency and packet loss under similar attack conditions.
引用
收藏
页数:6
相关论文
共 28 条
  • [1] [Anonymous], IETF MANET IN PRESS
  • [2] [Anonymous], 2004, P 27 AUSTRALASIAN C
  • [3] [Anonymous], P ACM MOBIHOC LAUS S
  • [4] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [5] Parser: A parallel simulation environment for complex systems
    Bagrodia, R
    Meyer, R
    Takai, M
    Chen, YA
    Zeng, XA
    Martin, J
    Song, HY
    [J]. COMPUTER, 1998, 31 (10) : 77 - +
  • [6] Stimulating cooperation in self-organizing mobile ad hoc networks
    Buttyán, L
    Hubaux, JP
    [J]. MOBILE NETWORKS & APPLICATIONS, 2003, 8 (05) : 579 - 592
  • [7] Enforcing service availability in mobile ad-hoc WANs
    Buttyán, L
    Hubaux, JP
    [J]. MOBIHOC: 2000 FIRST ANNUAL WORKSHOP ON MOBILE AND AD HOC NETWORKING AND COMPUTING, 2000, : 87 - 96
  • [8] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [9] A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS
    Djenouri, Djamel
    Khelladi, Lyes
    Badache, Nadjib
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04): : 2 - 28
  • [10] Supporting QoS in MANET by a fuzzy priority scheduler and performance analysis with multicast routing protocols
    Gomathy C.
    Shanmugavel S.
    [J]. EURASIP Journal on Wireless Communications and Networking, 2005 (3) : 426 - 436