Authentication of Secure Data Transmission In Wireless Routing
Texto
Documentos relacionados
Monitoring of routing packets and forwarding packets are done using our previous work of Trust based packet forwarding scheme by punishing or rewarding the nodes with decreasing
In this paper, simulation based study of the impact of neighbor attack and black hole attack on AOMDV routing protocol by calculating the performance metrics such as packet
We demonstrated this by proposing a simulation based framework for on-demand source routing protocols that allows us to give a precise definition of routing security, to model the
Earlier on-demand routing protocols[3,4,5,6,7] were based on flooding the routing packets in all directions irrespective of the location of the destination node, resulting
Data Centric Protocols: Sensor Protocol for information via negotiation like SPIN, COUGAR, Active query forwarding in sensor networks also called ACQUIRE, Sequential
These approaches vary from source routing approaches, where the entire path towards the destination is pre-computed by the data source, to the dynamic routing
The results are verified for the reactive routing protocols such as Dynamic Source Routing protocol (DSR) and Adhoc on demand distance vector routing protocol (AODV) and they
In Case 1, i,e., for high level of security ( sec_ level = 1), during routing process, the source and destination nodes separately verify the authenticity of all other nodes in