Secure routing protocol for Ad hoc based on WMPLS supporting recovery
7
Citation
0
Reference
20
Related Paper
Citation Trend
Abstract:
Based on framework of wireless multi-protocol label switching protocol and characteristic of mobile Ad hoc network,and considering routing security,we have proposed a secure routing protocol SA-WMPLS for Ad hoc using WMPLS signaling protocol supporting recovery to establish lable switch path.This scheme improves performance of routing and simplifies forwarding mechanism,and it also fastly recovers from a link or node failure.We have built an Ad hoc networking simulation model,analysed the performance of SA-WMPLS protocol,validated its security.Keywords:
Zone Routing Protocol
Path vector protocol
Cite
Zone Routing Protocol
Cite
Citations (0)
A lot of research effort has been put by researchers in developing routing protocols for Mobile Ad-hoc Networks (MANETs). Each protocol proposed and designed so far has its own merits and demerits. Researchers around the world continue to develop novel, advanced routing protocols that can route messages towards their destination in an efficient way while consuming minimum amounts of resources. In this work we take two well known MANET routing protocols, namely, the Ad-hoc On-demand Distance Vector routing protocol and the Epidemic routing protocol, and combine their preferred properties to formulate a new Hybrid routing protocol. We propose this routing protocol again as a reactive protocol with the objective of increasing the message delivery ratio while utilizing minimum mobile device resources. Our extensive simulation based experimental studies show that the newly proposed Hybrid protocol outperforms the other two protocols in many aspects under various testing scenarios.
Zone Routing Protocol
Interior gateway protocol
Hybrid routing
Cite
Citations (6)
In this paper, we present new protocol design scenario like Re-Pro Routing Protocol (RPRP) for Broadcasting in wireless mobile Ad-hoc Network and a comparative performance for Mobile Ad hoc Networks protocols like as Ad-hoc On-Demand Distance Vector Routing protocol focusing on the effects of changes such as the increasing number of receivers or sources and increasing the number of nodes. Although some simulation results of MANET protocols have been published before, these protocols have not been compared in isolation. A systematic performance evaluation of these protocols is done by performing certain simulations and the trust methods are one of the security methods in mobile Ad-Hoc networks and this methods are prone to security risks but have found their acceptance due to efficiency over computationally expensive and time consuming cryptographic methods. The major problem with the trust methods is the period during which trust is growing and is yet to reach the requisite threshold. This paper also proposes security mechanism dependent upon Electronic Code (EC) combined with permutation functions. The proposed mechanism has low time complexity, is easier to implement, computationally inexpensive and has very high brute force search value.
Distance-vector routing protocol
Cite
Citations (0)
Routing protocol is one of the best important technologies in Ad hoc network.This paper totally introduced routing protocols in Ad Hoc and then elaborated routing protocol the current basic situation in the arisen problem,the design idea and need these aspects.Finally,according to classifies routing protocol carries on the analysis and the comparison.
Zone Routing Protocol
Cite
Citations (0)
Zone Routing Protocol
Path vector protocol
Cite
Citations (0)
Zone Routing Protocol
Cite
Citations (0)
In large and dense mobile Ad Hoc networks,position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions.Though many papers are about secure routing protocol in Ad Hoc now,few consider the security of the protocol based on location.The new protocol that enhanced the original Grid Location Service(GLS)protocol was proposed.To adapt to the high mobility of Ad Hoc network,SGRP completed the TESLA by adding the authentication process as new node entering networks.The simulation result shows that the new protocol can isolate the spiteful node initiating interruption at tack effectively.
Zone Routing Protocol
Path vector protocol
Cite
Citations (0)
In the Ad hoc network,transmission was achieved by wireless multi-jump link of moving nodes.Therefore,development of a type of dynamic routing protocol which can effectively locate the route between the nodes was the key to design the Ad hoc network.In accordance with the features of the ad hoc network,the existed Ad hoc routing protocols and their weaknesses were analyzed to offer a method to improve typical routing protocols and provide a time-shared routing protocol for simulation.
Zone Routing Protocol
Cite
Citations (0)
Zone Routing Protocol
Cite
Citations (0)
Routing security has become an important issue due to the features such as self-organizing, dynamical topo-logical structure in mobile Ad hoc network. Since no security mechanism is provided for the existenting routing protocols, this paper describes several research results of secure routing strategies based on on-demand protocol and points out the problems that need to be solved. Then an efficient and secure routing approach(SEAR) is proposed for Ad hoc network. And this paper also specifies its routing process, analyzes its security and network performance through the comparisons with different protocols.
Zone Routing Protocol
Cite
Citations (2)