design, simulation and evaluation of a secure adaptive protocol based on multipathing in wireless ad hoc networks

نویسندگان

mansour nejati jahromi

alireza rezayi

چکیده

in a mobile ad hoc network, there are some features such as the ability to exploit multipath effect for information exchange with high reliability and low error rate. dealing with the aggressors and discovering the path in data transmission are of importance. approaching these goals ends in network promotion and efficiency. in this paper, the designed protocol is able to discover multipath for information exchange with high reliability. the designed network has advantages such as resistance against error occurrence, decreasing the effect of the aggressors and discovering the path in data transmission. the network security is based on the desired encoding and encryption and it provides increased speed and mobility of the network performance and efficiency and reduces the weaknesses of the security system. with increasing the speed of the nodes and density of the network, the receipt of the packets increases about four percent which causes one percent increase in packets transition. at the same time packet overhead decreases 12% on average.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...

متن کامل

LEBRP - A Lightweight and Energy Balancing Routing Protocol for Energy-Constrained Wireless Ad Hoc Networks

A wireless ad hoc network typically refers to any set of wireless networks where all devices have equal status on a network and are free to associate with any other wireless ad hoc network devices in their range. As the nature of these networks, they commonly do not have external power supplies, and each node has a limited internal power source. In this paper, we put forward a new routing proto...

متن کامل

Secure Public Key Protocol for Ad-Hoc Wireless Networks

As part of the security within distributed systems, various services and resources need protection from unauthorized use. Remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is prop...

متن کامل

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

This paper presents a secure decentralized clustering algorithm for wireless ad-hoc sensor networks. The algorithm operates without a centralized controller, operates asynchronously, and does not require that the location of the sensors be known a priori. Based on the cluster-based topology, secure hierarchical communication protocols and dynamic quarantine strategies are introduced to defend a...

متن کامل

Estimating Reliability in Mobile ad-hoc Networks Based on Monte Carlo Simulation (TECHNICAL NOTE)

Each system has its own definition of reliability. Reliability in mobile ad-hoc networks (MANET) could be interpreted as, the probability of reaching a message from a source node to destination, successfully. The variability and volatility of the MANET configuration makes typical reliability methods (e.g. reliability block diagram) inappropriate. It is because, no single structure or configurat...

متن کامل

Adaptive Cell-Relay Routing Protocol for Wireless Ad Hoc Networks

Most existing routing protocols for mobile ad hoc networks take a single routing strategy for different types of networks. Routing protocols suitable for small networks may not scale well in large networks. Routing protocols perform well in sparse networks may not suitable for dense networks. To achieve good performance, different routing strategies should be used for different types of network...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
the modares journal of electrical engineering

ناشر: tarbiat modares university

ISSN 2228-527 X

دوره 10

شماره 4 2011

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023