Investigating OLSR and AODV protocols and evaluating their throughput relativeto each other in detecting and countering sudden attacks in wirelesscommunication networks
عنوان مقاله: Investigating OLSR and AODV protocols and evaluating their throughput relativeto each other in detecting and countering sudden attacks in wirelesscommunication networks
شناسه ملی مقاله: ITCT23_069
منتشر شده در بیست و سومین کنفرانس بین المللی فناوری اطلاعات، کامپیوتر و مخابرات در سال 1403
شناسه ملی مقاله: ITCT23_069
منتشر شده در بیست و سومین کنفرانس بین المللی فناوری اطلاعات، کامپیوتر و مخابرات در سال 1403
مشخصات نویسندگان مقاله:
Elham haseli - Master of Computer Engineering-Software Orientation, Lahijan Azad University,Lahijan, Iran
خلاصه مقاله:
Elham haseli - Master of Computer Engineering-Software Orientation, Lahijan Azad University,Lahijan, Iran
Ad hoc networks, like other networks, need security to perform proper network operations including routing,forwarding data packets, maintaining and updating routing information. In fact, security is a necessary condition forthe proper functioning of the network, and without it, there is no guarantee for the correct performance of actions,and attackers can easily penetrate the network and disrupt its integrity. In this research, we first discussed thecharacteristics of case networks and then described the attacks in these networks. We have studied the variousprotocols presented to deal with the tunnel worm. According to the simulation results, the throughput of OLSRprotocol is higher than AODV, and the throughput has increased with the increase in the number of nodes and thedensity of the network. Although the OLSR protocol establishes routing security in ad hoc networks to a largeextent, it is still weak against tunnel worm attacks, so obtaining a protocol that completely prevents the creation oftunnel worms in the ad hoc network, with ۱۰۰% routing security and nodes remove the enemy from the network andsomehow reduce the load and traffic of the network in addition to the above parameters, it will be considered asfuture work.
کلمات کلیدی: ad hoc networks, routing, security, tunnel worm attack, throughput
صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/2059699/