Extended Dynamic Source Routing Protocol for the Non Co-Operating Nodes in Mobile Adhoc Networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Extended Dynamic Source Routing Protocol for the Non Co-Operating Nodes in Mobile Adhoc Networks

Authors: V. Narasimha Raghavan, T. Peer Meera Labbai, N. Bhalaji, Suvitha Kesavan

Abstract:

In this paper, a new approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate in an ad hoc environment. The extended DSR protocol is tested under different scenarios by varying the number of malicious nodes and node moving speed. It is also tested varying the number of nodes in simulation used. The result indicates the achieved throughput by extended DSR is greater than the standard DSR and indicates the percentage of malicious drops over total drops are less in the case of extended DSR than the standard DSR.

Keywords: Mobile Adhoc Networks, DSR, Grudger protocol, Nodes.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1330551

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1692

References:


[1] Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness and robustness in Mobile ad hoc networks. In proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based processing, Pages 403 - 410. Canary Islands, Spain. January 2002. IEEE Computer Society.
[2] Yih-Chun Hu, David.B.Johnson, and Adrian Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless ad hoc networks. In proceedings of the 4th IEEE workshop on Mobile computing Systems & Applications (WMCSA 2002), IEEE, Calicoon.NY. to appear, June 2002.
[3] Yih-Chun Hu, Adrian Perrig, and David.B.Johnson. Ariadne: A secure on-Demand routing Protocol for ad hoc networks. Technical Report Technical Report TR01-383, Department of Computer Science, Rice University, December 2001.
[4] Sergio Marti.T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehaviour in Mobile ad hoc networks. In Proceedings of MOBICOM 2000. Pages 255-265, 2000.
[5] Frank Stajano and Ross Anderson. The resurrecting Duckling, Lecturer Notes in Computer Science, Springer - Verlag, 1999.
[6] Lidong Zhou and Zygmunt Haas. Securing ad hoc networks, In IEEE Network Magazine, special issue on networking security, Vol.13, No.6, November / December, Pages 24-30, 1999.
[7] Richard Dawkins. The selfish Gene. Oxford University press, 1980 edition, 1976.
[8] Sonja Buchegger and Jean-YvesLe Boudec. The selfish node: Increasing routing security for mobile ad hoc networks. IBM Research Report. RR 3354, 2001.
[9] Kai Inkinen. New secure routing in ad hoc networks: Study and Evaluation of proposed schemes. Seminar on Interworking HUT T- 110.551.