• Nenhum resultado encontrado

Trust Based Power Aware Secure Source Routing Protocol using Fuzzy Logic for Mobile Adhoc Networks

N/A
N/A
Protected

Academic year: 2017

Share "Trust Based Power Aware Secure Source Routing Protocol using Fuzzy Logic for Mobile Adhoc Networks"

Copied!
10
0
0

Texto

Loading

Imagem

Fig 1. Weighted graph in the Adhoc Networks
Fig 3.  Most Trustable Path
TABLE IV. SIMULATION PARAMETERS
Fig 4d. Network Throughput vs Varying Speed
+2

Referências

Documentos relacionados

The best possible outcomes obtained from the above proposed fuzzy logic based protocol helps a mobile Ad- Hoc network to choose an efficient edge on the basis of

Source peer s, once gathering swarm agent RCSA, updates the secretion table with the pheromone indicator value g ni of every relay hope peer ni which

Topology Based routing approach has Route instability, this is because an established route consists of a set of nodes between the source and the destination that are affected

The proposed work aims at discovering an efficient energy aware routing scheme in MANETs that not only uses the node energy effectively but also finds the best route

The best possible outcomes obtained from the above proposed fuzzy logic based protocol helps a mobile Ad- Hoc network to choose an efficient edge on the basis of

Earlier on-demand routing protocols[3,4,5,6,7] were based on flooding the routing packets in all directions irrespective of the location of the destination node, resulting

Throughout , a discussion of existing mobile ad hoc networks' routing protocols’ types and their advantages and disadvantages was given and a list of existing proactive, reactive and

In Case 1, i,e., for high level of security ( sec_ level = 1), during routing process, the source and destination nodes separately verify the authenticity of all other nodes in