Affiliation:
1. Jaypee University of Information Technology, Department of Computer Science and Engineering, Waknaghat, India
Abstract
In the context of wireless technology, a secure communication is requisite for stopping the unauthorized access to the network services. This manuscripts aim is to detect and eliminate the malicious nodes involved during routing path formation in mesh environments by doing some amendments in basic AODV routing phenomenon. The proposed mechanism is further merged with previously proposed secure authentication and signature routing (SASR) protocol to address the security threats such as grey hole, black hole attacks and to recover the network metrics in terms of packet loss ratio, packet delivery ratio, computational time and network throughput. Further, the approach is simulated by computing the network throughput in both the scenarios i.e. with the involvement of malicious nodes and without involvement of malicious nodes. Moreover, we have validated the network metrics of proposed mechanism against conventional approaches.
Subject
Computer Networks and Communications
Reference25 articles.
1. Asherson, S., & Hutchison, A. (2006). Secure routing in wireless mesh networks. Proceedings of Southern African Telecommunication Networks and Applications Conference, Spier Wine Estate, Stellenbosch, South Africa.
2. Trust Based Secure Routing in Delay Tolerant Networks
3. Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks
4. Boushaba, M., Hafid, A., & Gendreau, M. (2016). Source-based routing in wireless mesh networks. IEEE systems Journal, 10(1), 262-270.
5. AODV routing protocol implementation design.;I. D.Chakeres;Proceedings of 24th International Conference on Distributed Computing Systems Workshops,2004
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献