Extended Dynamic Source Routing Protocol for the Non Co-Operating Nodes in Mobile Adhoc Networks
In this paper, a new approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate in an ad hoc environment. The extended DSR protocol is
tested under different scenarios by varying the number of malicious
nodes and node moving speed. It is also tested varying the number of
nodes in simulation used. The result indicates the achieved
throughput by extended DSR is greater than the standard DSR and
indicates the percentage of malicious drops over total drops are less
in the case of extended DSR than the standard DSR.
[1] Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges:
Towards Routing Security, Fairness and robustness in Mobile ad hoc
networks. In proceedings of the Tenth Euromicro Workshop on Parallel,
Distributed and Network-based processing, Pages 403 - 410. Canary
Islands, Spain. January 2002. IEEE Computer Society.
[2] Yih-Chun Hu, David.B.Johnson, and Adrian Perrig. SEAD: Secure
Efficient Distance Vector Routing for Mobile Wireless ad hoc networks.
In proceedings of the 4th IEEE workshop on Mobile computing Systems
& Applications (WMCSA 2002), IEEE, Calicoon.NY. to appear, June
2002.
[3] Yih-Chun Hu, Adrian Perrig, and David.B.Johnson. Ariadne: A secure
on-Demand routing Protocol for ad hoc networks. Technical Report
Technical Report TR01-383, Department of Computer Science, Rice
University, December 2001.
[4] Sergio Marti.T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing
misbehaviour in Mobile ad hoc networks. In Proceedings of MOBICOM
2000. Pages 255-265, 2000.
[5] Frank Stajano and Ross Anderson. The resurrecting Duckling, Lecturer
Notes in Computer Science, Springer - Verlag, 1999.
[6] Lidong Zhou and Zygmunt Haas. Securing ad hoc networks, In IEEE
Network Magazine, special issue on networking security, Vol.13, No.6,
November / December, Pages 24-30, 1999.
[7] Richard Dawkins. The selfish Gene. Oxford University press, 1980
edition, 1976.
[8] Sonja Buchegger and Jean-YvesLe Boudec. The selfish node: Increasing
routing security for mobile ad hoc networks. IBM Research Report. RR
3354, 2001.
[9] Kai Inkinen. New secure routing in ad hoc networks: Study and
Evaluation of proposed schemes. Seminar on Interworking HUT T-
110.551.
[1] Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges:
Towards Routing Security, Fairness and robustness in Mobile ad hoc
networks. In proceedings of the Tenth Euromicro Workshop on Parallel,
Distributed and Network-based processing, Pages 403 - 410. Canary
Islands, Spain. January 2002. IEEE Computer Society.
[2] Yih-Chun Hu, David.B.Johnson, and Adrian Perrig. SEAD: Secure
Efficient Distance Vector Routing for Mobile Wireless ad hoc networks.
In proceedings of the 4th IEEE workshop on Mobile computing Systems
& Applications (WMCSA 2002), IEEE, Calicoon.NY. to appear, June
2002.
[3] Yih-Chun Hu, Adrian Perrig, and David.B.Johnson. Ariadne: A secure
on-Demand routing Protocol for ad hoc networks. Technical Report
Technical Report TR01-383, Department of Computer Science, Rice
University, December 2001.
[4] Sergio Marti.T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing
misbehaviour in Mobile ad hoc networks. In Proceedings of MOBICOM
2000. Pages 255-265, 2000.
[5] Frank Stajano and Ross Anderson. The resurrecting Duckling, Lecturer
Notes in Computer Science, Springer - Verlag, 1999.
[6] Lidong Zhou and Zygmunt Haas. Securing ad hoc networks, In IEEE
Network Magazine, special issue on networking security, Vol.13, No.6,
November / December, Pages 24-30, 1999.
[7] Richard Dawkins. The selfish Gene. Oxford University press, 1980
edition, 1976.
[8] Sonja Buchegger and Jean-YvesLe Boudec. The selfish node: Increasing
routing security for mobile ad hoc networks. IBM Research Report. RR
3354, 2001.
[9] Kai Inkinen. New secure routing in ad hoc networks: Study and
Evaluation of proposed schemes. Seminar on Interworking HUT T-
110.551.
@article{"International Journal of Electrical, Electronic and Communication Sciences:52678", author = "V. Narasimha Raghavan and T. Peer Meera Labbai and N. Bhalaji and Suvitha Kesavan", title = "Extended Dynamic Source Routing Protocol for the Non Co-Operating Nodes in Mobile Adhoc Networks", abstract = "In this paper, a new approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate in an ad hoc environment. The extended DSR protocol is
tested under different scenarios by varying the number of malicious
nodes and node moving speed. It is also tested varying the number of
nodes in simulation used. The result indicates the achieved
throughput by extended DSR is greater than the standard DSR and
indicates the percentage of malicious drops over total drops are less
in the case of extended DSR than the standard DSR.", keywords = "Mobile Adhoc Networks, DSR, Grudger protocol,Nodes.", volume = "2", number = "10", pages = "2193-6", }