Trust-based security for the OLSR routing protocol
نویسندگان
چکیده
منابع مشابه
Trust-based security for the OLSR routing protocol
The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for O...
متن کاملValidation of the OLSR routing table based on trust reasoning
Self organization characteristics of Mobile ad hoc networks (Manet) make traditional security solutions inapplicable. In Manet, any node can be router, and can perturb the routing operation by broadcasting incorrect topological information, making the construction of routing table, which is the primary goal of routing protocols, the more vunerable operation. Thus, in such environments, there is...
متن کاملDifferent QoS based OLSR Proactive Routing Protocol using 802.11b
In this paper we have discussed and evaluated the comparative analysis of performance of OLSR routing protocol in two different networks with different number of users to find out with which network OLSR shows better performance. We are using OPNET simulator tool for the simulation of networks. Few performance metrics like Delay, throughput, end to end delay, MPR calculations, OLSR performance ...
متن کاملEnergy and mobility in OLSR routing protocol
We present in this paper a new mechanism for the OLSR routing Protocol, aiming to improve mobility and energy management in mobile adhoc network. As known OLSR use the concept of an MPR mechanism where only nodes selected as MPRs can relay broadcast packet received from their selectors, those nodes have to satisfy certain requirements to assure this mission , speaking of stability and physical ...
متن کاملLEACH-Based Security Routing Protocol for WSNs
LEACH is the first protocol of wireless sensor networks based on clustering and layered structure technology, but the security problem related to the wireless sensor network is not considered. Therefore, it is necessary to provide an efficient security routing algorithm for practical wireless sensor networks. In this paper, we proposed a LEACH-based key management scheme for wireless sensor net...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Communications
سال: 2013
ISSN: 0140-3664
DOI: 10.1016/j.comcom.2013.04.003