Trust-based security for the OLSR routing protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust-based security for the OLSR routing protocol

The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for O...

متن کامل

Validation of the OLSR routing table based on trust reasoning

Self organization characteristics of Mobile ad hoc networks (Manet) make traditional security solutions inapplicable. In Manet, any node can be router, and can perturb the routing operation by broadcasting incorrect topological information, making the construction of routing table, which is the primary goal of routing protocols, the more vunerable operation. Thus, in such environments, there is...

متن کامل

Different QoS based OLSR Proactive Routing Protocol using 802.11b

In this paper we have discussed and evaluated the comparative analysis of performance of OLSR routing protocol in two different networks with different number of users to find out with which network OLSR shows better performance. We are using OPNET simulator tool for the simulation of networks. Few performance metrics like Delay, throughput, end to end delay, MPR calculations, OLSR performance ...

متن کامل

Energy and mobility in OLSR routing protocol

We present in this paper a new mechanism for the OLSR routing Protocol, aiming to improve mobility and energy management in mobile adhoc network. As known OLSR use the concept of an MPR mechanism where only nodes selected as MPRs can relay broadcast packet received from their selectors, those nodes have to satisfy certain requirements to assure this mission , speaking of stability and physical ...

متن کامل

LEACH-Based Security Routing Protocol for WSNs

LEACH is the first protocol of wireless sensor networks based on clustering and layered structure technology, but the security problem related to the wireless sensor network is not considered. Therefore, it is necessary to provide an efficient security routing algorithm for practical wireless sensor networks. In this paper, we proposed a LEACH-based key management scheme for wireless sensor net...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Communications

سال: 2013

ISSN: 0140-3664

DOI: 10.1016/j.comcom.2013.04.003