The Appropriate Ad-Hoc Routing Protocols Determination under Jamming Attacks
Publish place: International Conference on
Publish Year: 1394
Type: Conference paper
Language: English
View: 1,047
This Paper With 17 Page And PDF Format Ready To Download
- Certificate
- I'm the author of the paper
Export:
Document National Code:
ICESAL01_148
Index date: 14 October 2015
The Appropriate Ad-Hoc Routing Protocols Determination under Jamming Attacks abstract
The Ad-Hoc networks are generated randomly and there is no infrastructure to make the networks. Today, these networks have many applications; so it has been studied a lot of researches in this case and now it continues. It is needed to routing protocols to make connection between nodes in Ad-Hoc networks. As nowadays the wireless environment, making communication and making security are the main research topics in these types ofnetworks. It is needed to recognize attacks and strategies that can deal with these types of attacks to provide relative security in these networks. In the article , it has paid to someexamples of routing protocols under Jamming attack in secure and insecure environments andaccording to the simulation results and important parameters in protocols evaluation like packets delay time, the numbers of lost packets and … for each environment, it hasidentified and suggested an appropriate protocol through the existing ones. To elevate TORA protocol security that is one of the most commonly used protocols, it has been suggested a new algorithm proposed. The proposed protocol has compared and analyzed with other protocols to determine the proposed protocol improvement.
The Appropriate Ad-Hoc Routing Protocols Determination under Jamming Attacks Keywords:
The Appropriate Ad-Hoc Routing Protocols Determination under Jamming Attacks authors
Kamal Bazargan
Computer Science, Graduated From Guilan University
Behrooz Razzaghi
Computer Science, Graduated From Rozbeh Private instituted
Mojtaba Rajabi
Computer Science, Graduated From Zanjan University
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :