The Appropriate Ad-Hoc Routing Protocols Determination under Jamming Attacks

سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 943

فایل این مقاله در 17 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICESAL01_148

تاریخ نمایه سازی: 22 مهر 1394

چکیده مقاله:

The Ad-Hoc networks are generated randomly and there is no infrastructure to make the networks. Today, these networks have many applications; so it has been studied a lot of researches in this case and now it continues. It is needed to routing protocols to make connection between nodes in Ad-Hoc networks. As nowadays the wireless environment, making communication and making security are the main research topics in these types ofnetworks. It is needed to recognize attacks and strategies that can deal with these types of attacks to provide relative security in these networks. In the article , it has paid to someexamples of routing protocols under Jamming attack in secure and insecure environments andaccording to the simulation results and important parameters in protocols evaluation like packets delay time, the numbers of lost packets and … for each environment, it hasidentified and suggested an appropriate protocol through the existing ones. To elevate TORA protocol security that is one of the most commonly used protocols, it has been suggested a new algorithm proposed. The proposed protocol has compared and analyzed with other protocols to determine the proposed protocol improvement.

نویسندگان

Kamal Bazargan

Computer Science, Graduated From Guilan University

Behrooz Razzaghi

Computer Science, Graduated From Rozbeh Private instituted

Mojtaba Rajabi

Computer Science, Graduated From Zanjan University

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Bob, Peter. "The Source Tree Adaptive Routing Protocol. Western Australian ...
  • Networks, March 2013: 293-315. ...
  • E. D, Ch. A, Z. L. "Fast Randomized Algorithm for ...
  • J.W.W, H-Ch.Ch, Yi-Pi. L. "A Secure DSDV Routing Protocol for ...
  • Jin, G. Fan and Sh.Y "Coverage Problem in Wireless Sensor ...
  • J-Li. K, Ch-H. Sh, Ch-Y. Ho, Y-Ch. Ch. "A cross-layer ...
  • Li, K. "Optimal Jamming Attacks and Network Defense Policies in ...
  • N.Zh, K.O and. "A Co untermeasure to Black Hole Attacks ...
  • T.S. "A Quantitative Study and Comparison of AODV, OLSR and ...
  • W.Xu, T.W. "Yanyong Zhang. Jamming Sensor Networks: Attack and Defense ...
  • W.Xu, T.W. "Channel Surfing and Spatial Retreats: Defenses against Wireless ...
  • Wu, C. Liu and J. Adaptive Routing in Dynamic Ad ...
  • Z. W, Y P.Ch, Ch. Li. _ _ Imp lementation ...
  • نمایش کامل مراجع