Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
|
|
- Gwendoline McLaughlin
- 3 years ago
- Views:
Transcription
1 ISSN (Print): Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept. of Information Technology, SOA University, 2 Dept. of Computer Science & Engg., SOA University, 3 Dept. of Computer Science & Engg., SOA University, 4 President, SOA University, Abstract The major challenge to design and deployment of mobile ad hoc networks (MANETs) is its dynamic nature, which carries with itself a set of security measures to be resolved. In this paper, we compare the behavior of three routing protocols DSDV, DSR and AODV under security attack, where the investigation is carried out with respect to two types of node misbehavior. The parameters taken into consideration for evaluation of network performance are normalized throughput, routing overhead, normalized routing load and average packet delay, when a certain percentage of nodes misbehave. It could be established through simulation results that DSDV is the most robust routing protocol under security attacks as compared to the other two. In addition, it reveals that a proactive routing protocol reduces the impact of security attack by excluding the misbehaving nodes in advance. Keywords : Ad hoc network, routing, selfish nodes and security. 1. Introduction A group of wireless nodes communicating in a localized wireless environment in the absence of any centralized administration and any fixed infrastructure, is known as a mobile ad hoc network (MANET). Dynamic nature of MANETs requires implementation of proper routing protocols, which should be adaptable to frequent changes in network topology and the nodes should be able to exchange information regarding topology changes to establish routes. Such frequent changes very often bring about the security issues in ad hoc networks. Traditional routing protocols cannot be useful to resolve these security issues in ad hoc networks due to its frequently changing network dynamics. As a result of frequent topology changes, packets exchanged between a pair of wireless nodes may follow different routes at different instants of time, and thereby may be exposed to attacks. At the same time, unlike in wired networks, it is difficult to authenticate the node of a MANET in the absence of online servers [1]. The group of commonly encountered attacks may include replay attack, denial of service (DoS), modification, masquerading, routing table overflow, impersonation, energy consumption etc. [2]. A number of solutions have been proposed to protect routing messages from being modified by the attackers or harmful messages being injected to the network [1,3,5 and 6]. Authors in [4] have carried out an analysis of security exposures in MANETs with an assumption that the nodes misbehave under security attacks. The Dynamic Source Routing (DSR) Protocol [9] lists three types of node misbehavior in routing as experienced by MANETs. Simulations suggest that network operation and maintenance can be easily jeopardized and network performance can be severely affected as a result. In this paper, we intend to compare the performance of DSR under security attacks with that of DSDV (Destination Sequenced Distance Vector) [7] and AODV (Ad hoc Ondemand Distance Vector) [8] protocols. It should be noted that the performance of above three protocols have been extensively studied in the absence of any security threat prior to the above mentioned comparison [10]. In course of this simulation, the robustness of each of these protocols is observed in the presence of security attack. The rest of the paper is organized as follows. A brief discussion of the above three protocols is included in
2 ISSN (Print): section 2 with two types of node misbehavior being taken into consideration. The simulation environment and methodology are covered in section 3. Simulation results are discussed in Section 4 and Section 5 includes the conclusion and the future extensions. 2. Ad Hoc Routing Protocols and Misbehaving Nodes 2.1 Routing Protocols : The routing protocols implemented in MANETs are globally classified into two categories: proactive or table driven protocols and reactive or on-demand protocols. Table driven protocols rely on a table, which maintains consistent up-to-date information regarding routes to all possible destinations, whereas on-demand routing protocols implement source-initiated route establishment, where a route is created when desired by the node. In this paper, we compare the performance of a table-driven protocol DSDV with two most popular on-demand routing protocols such as DSR and AODV. Proactive routing protocol DSDV operates with a table driven algorithm, based on Bellman-Ford routing mechanism. In this approach, every mobile node in the network maintains routes to all possible destinations with number of hops in between. Each entry is marked with a sequence number as assigned by the destination node. With the help of sequence numbers, mobile nodes can be able to distinguish stale routes for the new ones, and as a result, routing loops can be avoided. Reactive routing protocol DSR comprises two mechanisms: route discovery and route maintenance. It enables the mobile nodes in an ad hoc network to discover routes to arbitrary destinations as per requirement. In the beginning, the source node initiates a Route Discovery mechanism comprising two phases: Route Request and Route Reply. On successful completion of these two phases, a route is established between the source and destination following which the source node appends the destination address to its data packets and sends them along the route. The intermediate nodes act as routers of the packets and do not maintain any up-to-date routing information. Reactive routing protocol AODV is an enhancement of DSDV, which significantly minimizes the number of broadcasts required during route establishment by creating routes on-demand basis. It does not need to maintain all possible routes unlike DSDV, which convincingly reduces the required storage capacity at a node in the MANET. As suggested by authors of AODV, it is a perfect on-demand routing protocol, since nodes not belonging to a route, do not necessarily participate in route discovery, neither maintain up-to-date routing information. A source node needs to initiate a route discovery mechanism, when it has to send to a required destination. 2.2 Node Misbehaviors : Identification of misbehaving nodes in ad hoc networks is critically important to detect security attack in the network. Two types of misbehaving nodes such as selfish and malicious nodes are taken into consideration in [4]. Selfish nodes do not intend to directly damage other nodes, but however, do not cooperate, saving battery life for their own communications. But malicious nodes do not give priority to saving battery life, and aim at damaging other nodes. In the current research paper, with reference to [4], we introduce two different types of selfish nodes. As the nodes in MANETs are battery powered, energy becomes a precious resource, and thus, role of selfish nodes draws more attention. Thus, we introduce altogether three routing behaviors of nodes in a MANET. a) Type 0 : well-behaved node : A well behaved node cooperates in the communication well, performs as required by the routing protocol, and equally participates in the communication activities like route discovery, maintenance, packet forwarding and receiving etc. b) Type-1 : active selfish node : Such a node does not participate in packet forwarding, and drops every received packet, and thus, it disables the packet forwarding mechanism for the packets which have a destination address, other than this selfish node. In fact, it helps the selfish node to save its own energy, thereby still contributing to network maintenance. c) Type 2 : passive selfish node : Such a node practically does nothing and stays idle in the network. It does not contribute to any of the activities like packet forwarding, receiving, route discovery, network maintenance. With respect to above mentioned misbehaving nodes, we evaluate the performance of DSDV, DSR and AODV routing protocols through extensive simulations, where a certain percentage of nodes behave as active and/or passive selfish nodes with the remaining nodes being wellbehaved. 3. Simulation Methodology and Simulation Environment We use network simulator ns2 for our proposed simulations. It comprises the models and modules at physical and data link layers, MAC layer protocols and the ad hoc routing protocols DSDV, DSR, AODV, which we
3 ISSN (Print): need to compare. Speed of a node in the ad hoc network is uniform (Random way point mobility model). After reaching the destination, a node pauses for a specified interval of time before choosing a random destination and repeating the process. Constant Bit Rate (CBR) traffic is chosen for communication among randomly selected nodes. Two types of node misbehaviors mentioned above are incorporated in ns2 as separate node definition types, which allow picking a selfish model between two possible choices. Table 1 lists some common parameters used in course of the simulation. Table 1:Fixed parameters for simulation Parameters Values Area 1000m x 1000m Radio range 250 m Link capacity 2 Mbps Pause time 5 seconds Simulation time 200 seconds Buffer size 50 packets Application Constant bit rate (CBR) traffic Packet size 512 bytes In addition to the parameters, specified in Table-1, we change certain aspects of MANETs in order to evaluate the network performance of routing protocols under security attack. Table 2 lists these aspects. Table 2 : Variable parameters for simulation Parameters Values Network density High (60 nodes) / low (20 nodes) Network mobility High (15 m/s)/ low (20 nodes) Routing protocols DSDV / DSR / AODV Types of selfish node Type 1 / Type 2 Percentage of SNs 0 50% 3.1 Important Aspects for Evaluation of Network Performance: These aspects are: a) Network density: It is the number of nodes per unit area in the MANETs. We take into consideration two categories of network densities: high density (60 nodes in an area of 1000m x 1000m) and low density (20 nodes in an area of 1000 m x 1000 m). It should be noted that density of nodes in a MANET significantly influences the performance of routing protocols inversely. An increased density of nodes in the network would subsequently decrease the performance of the routing protocol, and at the same time, might cause the deleterious effect of selfish nodes to reduce thereby. b) Network Mobility: We have used two types of mobility scenarios during the simulation. With a high mobility scenario, the nodes move at a maximum speed of 15 m/s, and with a low mobility scenario, the nodes are allowed to move at a maximum speed of 2 m/s within the network. In a high mobility network, the performance of routing protocols is supposed to be degraded. c) Routing Protocols: One table driven (DSDV) routing protocol and two on-demand (DSR, AODV) routing protocols are used in the simulations. d) Types of selfish nodes: Both types of selfish nodes (Type-1 and Type-2) are used in the simulations. It should be noted that Type-1 (Active) selfish node is more harmful as compared to Type 2 (passive) selfish node, since it participates in route discovery and maintenance, but not in forwarding the packets e) Percentage of selfish nodes: The number of selfish nodes is set between 0% and 50%, the rest of the nodes being well-behaved. It is quite obvious that the network will suffer more, if more number of well behaved nodes is compromised to selfish nodes. 3.2 Performance Metrics : The following metrics are taken into consideration for evaluation of performance of three routing protocols mentioned above. a) Normalized throughput: This is the ratio of packets received by the CBR sink to the number of packets sent by the CBR source, at the application level. Often this ratio may be found to be less than 1, as some packets may be lost due to link failures, congestion and so on. b) Average packet delay: The average delay is calculated for the packets, which are received by the destination. Obviously, the lost packets have an infinite delay. c) Routing overhead: It represents the total number of routing packets transmitted at the network layer during the simulations. A packet traversing multiple hops is subject to multiple transmissions, i.e. one transmission for each hop. d) Normalized routing load: It is the ratio of the total number of packets transmitted at the network layer to the total number of CBR packets received by the destination at the application layer. A Proper evaluation of the routing protocols could be achieved with these metrics. The completeness and correctness of the routing protocol can be established by normalized throughput. Efficiency of the protocol to correctly deliver a packet and average network congestion can be obtained from average packet delay. A measure of scalability of the routing protocol and its power consumption efficiency can be determined by the routing
4 ISSN (Print): overhead. Finally, normalized routing load determines the average number of hops between the source and the destination and the efficiency too. 4. Results and Discussions Simulation results of ad hoc network with low node density are demonstrated and analyzed. The results for normalized throughput, average delay, routing overhead and normalized routing load of network with low node density are depicted in Figures 1, 2, 3 and 4 respectively. Both types of node mobility (high & low) and both types of selfish nodes (Type1 and Type 2) are incorporated in the simulations. It can be observed that DSR and AODV demonstrate degraded performance under both types of selfish nodes, whereas DSDV shows comparatively more robustness, although its performance is degraded too. Fig. 1.a : Throughput for low mobility, type 1 Fig. 1.d : Throughput for high mobility, type Normalized Throughput : Normalized throughput of DSDV, DSR and AODV are presented in Fig. 1, with low node density, low/high node mobility, and with increasing percentage of Type 1 and Type 2 selfish nodes in the network. In the absence of selfish nodes in a low mobility network, DSR and AODV maintain higher throughput being able to deliver 80% of the offered load as compared to that of DSDV, which delivers only 60% of the offered load. (Fig. 1a and 1b). As the percentage of selfish nodes increases, throughput of all three protocols degrades. However, in a high mobility network, the impact of selfish nodes on throughput of DSDV is not significant (10% to 30% of normalized throughput) (Fig. 1c and 1d), whereas the normalized throughput of DSR and AODV drops significantly (10% to 60% for DSR and 10% to 70% for AODV). The reason for such a degradation of performance is that the selfish nodes do not cooperate like the well behaved nodes do. Active (Type 1) selfish nodes do not forward the received packets, whereas the passive (Type 2) nodes do not participate in any routing activity. This results in reduction in packet delivery ratio and degradation of the performance of the ad hoc network as a whole. Fig. 1.b : Throughput for low mobility, type 2 Fig. 2.a : Average delay for low mobility, Type 1 Fig. 1.c : Throughput for high mobility, type 1
5 ISSN (Print): to all possible destinations and does not require a route discovery phase. Fig. 2.b: Average delay for low mobility,type-2 Fig. 3.a : Routing overhead for low mobility, Type 1 Fig. 2.c : Average delay for high mobility, Type 1 Fig. 3.b: Routing overhead for low mobility,type-2 Fig. 2.d: Average delay for high mobility,type Average Packet Delay : In a low mobility ad hoc network with low/high mobility of nodes, the average packet delay in DSR, AODV and DSDV with increasing percentage of selfish nodes (both Type 1 and Type 2) is depicted in Fig.-2. It can be noticed that the impact of the selfish nodes on packet delay for all three protocols is not significant. However, under low mobility, with increasing percentage of passive (Type 2) selfish nodes, packet delay in DSR increases significantly (Fig. 2a, 2b) and the same occurs in AODV under high node mobility (Fig. 2c & 2d). Fig. 3.c : Routing overhead for high mobility, Type 1 As a whole, it can be observed that DSR has the higher packet delay among all three routing protocols, and DSDV has the lowest packet delay with or without the selfish nodes. The reason for this is that DSR involves additional latency for route discovery phase and during link breakages, whereas DSDV permanently maintains routes Fig. 3.d: Routing overhead for high mobility,type-2
6 ISSN (Print): Routing Overhead: Routing overhead with low node density ad hoc network under low/high node mobility for routing protocols, DSDV, DSR and AODV protocols with increasing percentage of selfish nodes are shown in Fig. 3. In low mobility scenario, routing overhead for AODV decreases convincingly from packets (with no selfish nodes) to 1500 packets (with 10% selfish nodes) (Fig. 3a and 3b), and then decreases less significantly when the percentage of selfish nodes increases further. The same trend is observed in case of DSR, obviously both DSR and AODV being on-demand routing protocols. As the normalized throughput of DSR and AODV gets severely affected by the selfish nodes (Fig. 1), more packets are dropped and thus, the routing overhead becomes less. On the other hand, the routing overhead in DSDV remains almost constant, irrespective of whether the selfish nodes are present or not, since DSDV is a table-driven routing protocol and hence, it has a relatively stable routing overhead (Fig. 1). In a high mobility scenario, the routing overhead of DSR and AODV decreases with increasing percentage of selfish nodes in the network, but that of DSDV remains almost unaffected. Fig. 4.a: Normalized routing load for low mobility, Type1 Fig. 4.c :Normalized routing load for high mobility, Type1 Fig. 4.d : Normalized routing load for high mobility, Type2 4.3 Normalized Routing Load: The normalized routing load under low node density and low/high mobility for DSDV, DSR and AODV with increasing percentage of selfish nodes are shown in Fig. 4. Unlike the previous scenarios, no constant trend can be observed from AODV. With low mobility and in presence of active (Type-1) selfish nodes, the normalized routing load increases with increase in percentage of such nodes in the network (Fig. 4a). However, this trend does not hold for passive (Types) selfish nodes (Fig. 4b). With high mobility, the normalized routing load remains unaffected in the presence of both types of selfish nodes (Fig. 4 c and 4 d). No obvious trend is observed for DSR in either case. But, in case of DSDV, the normalized routing load increases slightly with the increase of selfish nodes in the network (Fig. 4a, 4b, 4c and 4d). It shows that a packet needs to travel more hops to reach the destination, when more nodes are compromised. 5. Conclusion and Future Work Fig. 4.b:Normalized routing load for low mobility1, Type2 In this paper, performance of three ad hoc routing protocols DSR, AODV, DSDV are compared under security attack. The performance parameters taken into consideration are normalized throughput, average packet delay, routing overhead and normalized routing load, in the presence of selfish nodes in the network. It could be concluded from the simulation results that DSDV is identified to be more robust under security attack as
7 ISSN (Print): compared to DSR and AODV in terms of all performance parameters. Thus, a table-driven routing protocol has the potential to maintain the robustness in the presence of misbehaving nodes in the network. In future, we intend to carry out the same comparison over a wide range of routing protocols, thereby devising methods of detection of selfish nodes in ad hoc networks. References [1] H. Li and M. Singhal. A secure routing protocol for wireless ad hoc networks. In HICSS 06: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, page 225.1, Washington, DC, USA, IEEE Computer Society. [2] H. Deng, W. Li, and D. P. Agrawal. Routing security wireless ad hoc networks. IEEE Communications Magazine, 2(1), [3] C. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt. A specification-based intrusion detection system for AODV. In SASN 03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages , New York, NY, USA, ACM Press. [4] P. Michiardi and R. Molva. Simulation-based analysis of security exposures in mobile ad hoc networks. In Proceedings of European Wireless Conference, [5] K. Paul and D. Westhoff. Context aware detection of selfish nodes in DSR based ad-hoc networks. In IEEE GLOBECOM 2002, Taipei, Taiwan, November [6] P. Papadimitratos and Z. J. Haas. Securing routing for mobile ad hoc networks. In Proceedings SCS (CNDS2002), [7] C. E. Perkins and P. Bhagwat. Highly dynamic destinationsequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM 94, pages , London, England, August [8] C. E. Perkins and E. M. Royer. Ad hoc on-demand distance vector routing. In IEEE WMCSA 99, pages , New Orleans, [9] D. B. Johnson. Routing in ad hoc networks of mobile hosts. In IEEE Workshop on Mobile Computing Systems and Applications, pages , December [10] J. Broch, D. A.Maltz, D. B. Johnson, Y. Hu, and J. Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols. In MobiCom 98: Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, pages 85 97, New York, NY, USA, ACM Press.
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co
Routing Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
Analysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
Performance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks
Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks Pietro Michiardi and Refik Molva Piero.Michiardi@eurecom.fr Refik.Molva@eurecom.fr Institut Eurécom, 2229 Route des Crêtes BP 193
Performance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,
An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET
An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini
ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS
ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile
IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS
IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India
Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla
Performance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
Selfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets
Journal of Computer Science, 9 (1): 37-42, 2013 ISSN 1549-3636 2013 Lakshmi and Radha, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/jcssp.2013.37.42
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK
International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 531-538 COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD
Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols
Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile
Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols
Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,
Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV
Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar
Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
AODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range
Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range Asha Ambhaikar and Lokesh Kumar Sharma Abstract a mobile ad hoc network is a collection of autonomous
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network
Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET
Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Aaditya Jain M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College,
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
Performance of DSDV Protocol over Sensor Networks
Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com
Detection and Removal of Black Hole Attack in Mobile Ad hoc Network
Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically
Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network
Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols
Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan
Performance Analysis of Three Routing Protocols for Varying MANET Size
Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,
6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
Keywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
SUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks
A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,
Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
Evaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
Secure Routing and Transmission Protocols for Ad Hoc Networks
MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks
A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet
A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India
2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS
ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo
Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Masroor Ali 1, Zahid Ullah 2, Meharban Khan 3, Abdul Hafeez 4 Department of Electrical Engineering, CECOS University of IT and Emerging
IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Performance Comparison of ADSDV and DSDV in MANET Brahm Prakash Dahiya Shaym Lal College,New Delhi, India brahmprakasd@gmail.com
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi
Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India
Simulation based performance of AODV (Reactive) and DSDV (Proactive) routing protocol for MANET Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India Abstract Mobile Ad
A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes
A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes Ruchi Khandelwal 1 & Akhilesh Kosta 2 Department of Computer Science and Engineering
Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks
Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks Anil Choudhary Department of Electrical and Electronics Engineering Rajiv Gandhi Govt. Polytechnic, Itanagar, Arunachal Pradesh, India
Figure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
Routing Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols
Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);
Maharishi Markandeshwar University
RESEARCH ARTICLE OPEN ACCESS Simulation Based Performance Comparison of Adhoc Routing Protocols Kushagra Agrawal*, Shaveta Jain** *Department of Computer Science,, Mullana, Ambala agrawal_kushagra@rediffmail.com
IN a mobile ad hoc network, nodes move arbitrarily.
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network
ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
Computation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse
Ad Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model
American Journal of Applied Sciences 5 (6): 659-664, 2008 ISSN 1546-9239 2008 Science Publications Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point
Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks
Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks Som Chandra Neema Venkata Nishanth Lolla {sneema,vlolla}@cs.ucr.edu Computer Science Department University of California, Riverside Abstract
IJMIE Volume 2, Issue 9 ISSN:
PERFORMANCE ANALYSIS OF DSDV WITH OTHER MANET ROUTING PROTOCOL USING RANDOM WAYPOINT MOBILITY MODEL IN NS-3 Saurabh kumar soni* Prof.Prem Narayan Arya* ABSTRACT Routing protocols are a critical aspect
Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
Performance Evaluation of AODV and DSR routing protocols in MANET
Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and
II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.
A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics
Analysis of Routing Protocols in MANETs
Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,
Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols
Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,
Analyzing the Route Cache Timeout Parameter of DSR Protocol in Mobile Ad Hoc Networks
Analyzing the Route Cache Timeout Parameter of DSR Protocol in Mobile Ad Hoc Networks Barış Özyurt1*, İbrahim Alper Doğru2, Muhammet Ali Akcayol3 1 Dept. of Computer Science, Gazi University, Ins. of Information,
Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols
Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,
Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs
Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,
A COMPARISON STUDY OF DSDV AND SEAD WIRELESS AD HOC NETWORK ROUTING PROTOCOLS
A COMPARISON STUDY OF DSDV AND SEAD WIRELESS AD HOC NETWORK ROUTING PROTOCOLS M.S.R.S Prasad 1, S.S. Panda 2, MNM Prasad 3, S.T.V.S.Kumar 4 1 Assistant Professor (SG), Dept. of CSE., Regency Institute
Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,
Performance Evaluation of Routing Protocols for MAC Layer Models
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 71-77 Performance Evaluation of Routing Protocols for MAC Layer Models Somya
A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)
RESEARCH ARTICLE International Journal of Computer Techniques - Volume 2 Issue 1, 2015 OPEN ACCESS A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) Sejal D Mello 1, Priyanka B. Patil 2, Tarannum
DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS
DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS Abdulrahman H. Altalhi Computer Science Department University of New Orleans New Orleans, LA, 70148 USA Golden G. Richard, III Abstract
Effects of Caching on the Performance of DSR Protocol
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder
A Simulation study : Performance comparison of AODV and DSR
A Simulation study : Performance comparison of AODV and DSR K.Dileep Kumar 1, N.Seethayya 2, H.Venkata Bhagya Sri 3,S.Papa Rao 4 1,2,3,4 Asst.Professor Department of CSE, Sri Sivani College of Engineering,
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile
An Optimized Inter-Router Authentication Scheme for Ad hoc Networks
An Optimized Inter-Router Authentication Scheme for Ad hoc Networks Lakshmi Venkatraman, Dharma P Agrawal Center For Distributed and Mobile Computing Department of Electrical and Computer Engineering and
PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET
Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh
Chapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
Comparison of Various Routing Protocols & Brief of MANET
International Journal of Modern Trends in Engineering and Research www.ijmter.com Comparison of Various Routing Protocols & Brief of MANET Akashkumar Patel 1, Rakshitkumar Hirapara 2, Vivekkumar Dhamecha