Optimization of AODV and SAODV Routing Protocols in Wireless sensor Networks- Simulation with ns-2

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 447

This Paper With 12 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICESCON01_0492

تاریخ نمایه سازی: 25 بهمن 1394

Abstract:

The combination of peer to peer wireless links and access points create a backhaul infrastructure called a wireless mesh network (WMN), this backhaul infrastructure works with the nodes in the same network using a common set of routing/forwarding protocols. The access points or routers form a mesh of self-configuring, self-healing links among themselves. The nodes in the WMNs operate in a wireless medium and could be stationary or mobile. This creates interesting parallels between Mobile Ad-hoc Networks (MANET) and WMN. In both the cases the nodes are mobile and communicate directly with each other. In fact WMN can be viewed as MANETs co-existing with other infrastructure to provide wide-scale coverage. The IEEE 11.288s ESS (Extended Service Set) Mesh Networking Task Group is working on creating a standard for WMNs, the routing protocol that they are considering is based on AODV (Ad-Hoc On Demand distance Vector), which has been researched extensively with MANETs. AODV does not provide any security features but it has a secure counterpart SAODV (Secure AODV), which provides security features like integrity and authentication. This project aims to compare and contrast SAODV and AODV by utilizing the NS-.(Optimized Network Engineering Tool) simulation application, to evaluate how SAODV could possibly apply for securing WMN routing messages. A new model for SAODV has been derived from the AODV model in NS-.. Performance is evaluated on the basis of the fraction of packets delivered, the end-to-end delay and routing load for a given traffic and mobility scenario. It is observed that SAODV has comparable results for end-to-end delay and route discovery time with the added security feature.

Authors

Masoud Moradi

Young Researchers Club, Department of Electrical Engineering , Ilam Branch, Islamic Azad University, Ilam, Iran

Anvar Hemati

Young Researchers Club, Department of Electrical Engineering , Ilam Branch, Islamic Azad University, Ilam, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • J.Broch, D.A.Maltz, D.B.Johnson, Y-C. Hu, J.Jetcheva, _ Performance Comparison of ...
  • Y. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks ...
  • [.7] S.Capkun, L.Buttyan, J.-P.Hubaux, _ Self-Organized Public Key Management for ...
  • S.Xu, Y.Mu, W.Susilo, "Authenticated AODV Routing Protocol using One-Time Signature ...
  • W.Wang, Y.Li, B.K.Bhargava, _ the Vulnerability and Protection of Ad-Hoc ...
  • Y. Hu, A. Perrig, and D. B. Johnson, "SEAD: Secure ...
  • نمایش کامل مراجع