Filters








5,667 Hits in 4.4 sec

Enhanced DSR for MANET with Improved Secured Route Discovery and QoS

Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani Kumar Ramani
2007 International Journal of Network Security  
The paper evaluates integration of Secured Routing Protocol (SRP) and Secured Message Transmission (SMT) with DSR to get Secured Dynamic Source Routing (S-DSR), which is capable of secured route discovery  ...  The paper finally concludes with remarks on a possible comprehensive S-DSR protocol, incorporating better route cache maintenance scheme, proactive route discovery and integration of SRP/SMT features for  ...  Enhancement of DSR for Secured Route Discovery We shall now focus on the integration of SRP with DSR to get S-DSR for Secured Route Discovery.  ... 
dblp:journals/ijnsec/RawatVR07 fatcat:lomkhbm7jjdtvjglziauoycrkq

DoS Attack Prevention Technique DSR Protocol based on Signal Strength

Rakesh Dhatarwal, D. M.
2017 International Journal of Computer Applications  
Dynamic Source Routing (DSR) is one of the extensively used routing protocols for packet transfer from source to destination.  ...  Thus, the efficiency of the routing protocol will affect the all network performance.  ...  Develop an adaptive GDSR routing protocol of the secure DSR protocol extension. 2. Develop the secure routing protocol to solve the problem of malicious node through G value calculating.  ... 
doi:10.5120/ijca2017914311 fatcat:kinycphjvvbudbwkaimqrfpmry

Evaluation of Routing Protocols in Wireless Ad-Hoc Networks under Security Attacks

IR Saidu, P Odion, DT Chinyio
2017 International Journal of Contemporary Research and Review  
led to heavy overload and congestion problems .Further more, when comparing the two reactive routing protocols, AODV performs better than DSR.  ...  In the results analysis of routing protocols under the security attacks, it was observed that the DSDV significantly has lower performance as are sult of frequent link changes and connection failure swhich  ...  The simulations were run and the performance of the three routing protocols DSDV,DSR and AODV in wireless Ad-Hoc network sin the absence of the security attacks and with the presence of the four security  ... 
doi:10.15520/ijcrr/2017/8/10/342 fatcat:kdt7tso7h5fmhijheufqdp7umm

DDBA-DSR: Detection of Deep Black Hole Attack in DSR

Mamta Mamta, Suman Deswal
2013 International Journal of Computer Applications  
Keywords MANET, DSR, routing protocol, deep black hole attack.  ...  From a security design perspective, there is no built-in security. So, security is one of the main concerns in ad hoc networks.  ...  Algorithmic Steps for DDBA-DSR SIMULATION AND ANALYSIS Simulation Model To compare the proposed secured routing protocol with DSR protocol and to check the effectiveness of the proposed method, a network  ... 
doi:10.5120/13016-0037 fatcat:dhkw22vqpjgqnj3dhdpcd47b6e

Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm

Pooja Kundu, Neeti Kashyap
2016 International Journal of Wireless and Microwave Technologies  
With these benefits, there are some issues related to these networks. One of these issues is of secure communication. Malicious nodes can easily attack existing routing protocols for MANETs like DSR.  ...  In this paper we have proposed a modification of DSR by using message digest. The proposed work produces better results in terms of different metrics when compared with the results of DSR.  ...  [1] In our paper, we've got changed the DSR (dynamic supply routing) protocol with the assistance of message digest (MD5) to extend security and avoid selecting routes with malicious nodes.  ... 
doi:10.5815/ijwmt.2016.05.06 fatcat:e74wxcrd75dolbvunlehogvone

Analysis of Security Issues, Challenges and Current Trends in AODV and DSR

Harsha Sharma
2015 IJIREEICE  
In this paper, we detail security threats and limitations of AODV [1] and DSR [2] Routing Protocol. We identify the current secure protocols based on AODV and DSR -SAODV, SAR, ARIADNE, SRP and ARAN.  ...  Recent research in ad hoc networks has focused on implementing secure routing protocols.  ...  ACKNOWLEDGMENT The author would like to thank Professor Parul Tomar for guidance and invaluable inputs throughout the process of writing this paper.  ... 
doi:10.17148/ijireeice.2015.31008 fatcat:ztl2agagq5h4xpn2glpsglizea

Functionality Validation of the New QOS and Security Integration Model for Manet

Jan Papaj, Lubomir Dobos, Anton Cizmar
2013 Communications - Scientific Letters of the University of Zilina  
Research communities in MANET's solve problems of Secure Routing, Key Management and Intrusion Detection System [4].  ...  Security is also a dynamically evolving field. The major role of security mechanism is the ensuring of services: Confidentiality, Authentication, Availability, Integrity and Non-repudiation.  ...  The block Modified routing protocol represents the routing protocol with implemented modified SSV algorithm for selecting the optimal way based on user defined requirements (QoS and security).  ... 
doi:10.26552/com.c.2013.2a.134-138 fatcat:jpiaczll2jartbyswi3czjrhgq

Authentication Based and Optimized Routing Technique in Mobile Ad hoc Networks

Varadhaganapathy
2011 Journal of Computer Science  
Conclusion: The Double Hash Technique in association with SHORT has improved the performance of the DSR protocol.  ...  This security mechanism has been simulated on Dynamic Source Routing (DSR) protocol in addition to Self-Healing and Optimized Routing Technique (SHORT) made the routing secure for ad hoc networks.  ...  DHT along with SHORT has been applied to DSR routing protocol and its performance has been measured.  ... 
doi:10.3844/jcssp.2011.651.656 fatcat:irlbotqgsnh5jn33mjmam6tfae

Security Enhanced DSR protocol to prevent Black hole attacks in MANETs

K. Selvavinayaki, K.K.Shyam Shankar, E. Karthikeyan
2010 International Journal of Computer Applications  
The proposed method is to be adapted on DSR protocol .This method is capable of detecting and removing black hole nodes in the MANET. Keywords Black hole attack, DSR, Security certificate.  ...  There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed.  ...  The DSR protocol comes with the routing cache , which stores the route for each node in the network. This routing cache can be refreshed periodically to store the fresh routes.  ... 
doi:10.5120/1292-1766 fatcat:wzwiimnonbhnna6hm3psscb4hm

Mobile Ad Hoc Network Routing Protocols: Performance Evaluation and Assessment

Muawia A. Elsadig et. al.
2018 International Journal of Computing and Digital Systems  
In a high-density network (a network with a large number of nodes), AODV outperforms DSR; while, in a low-density network the DSR performs better than the AODV.  ...  This paper presents an investigation into some popular MANET routing protocols.  ...  Routing protocols operate at the network layer of the TCP/IP model; many protocols are developed to secure connection between source and destination node (i.e. DSR, AODV, DSDV, TORA, OLSR etc.).  ... 
doi:10.12785/ijcds/070107 fatcat:zc4haafvdvcpjn5rd4f7uf5mcq

Performance Evaluation of Zrp Star and Dsr under Vanet's

Harjit Singh, Manju Bala, Manoj Kumar
2014 IOSR Journal of Computer Engineering  
in conventions like ZRP, STAR and DSR by utilizing the Qualnet 5.0.1 test system.  ...  Such data ought to be right and truthful, as it rely on the requisition and verification is important administrations for activity security in Vanets.  ...  shows Jitter with number of nodes varying from 20 to 100 nodes for STAR, DSR and ZRP routing protocol.  ... 
doi:10.9790/0661-16328589 fatcat:aqvmwfc77fb2fcq5ziuwbcce5y

A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack

Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson
2007 Third International Symposium on Information Assurance and Security  
Simulation results show that although the performance of all three routing protocols degrades, DSDV is the most robust routing protocol under security attacks.  ...  This paper compares three routing protocols, DSDV, DSR, and AODV under security attack where two types of node misbehaviour have been investigated.  ...  The objective of this paper is to extend this work to compare the performance under security attack of DSR with two other well-known ad hoc routing protocols: DSDV (Destination Sequenced Distance Vector  ... 
doi:10.1109/isias.2007.4299750 fatcat:bgpj7s7cjvhl7inbmqn3zeamda

A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack

Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson
2007 Third International Symposium on Information Assurance and Security  
Simulation results show that although the performance of all three routing protocols degrades, DSDV is the most robust routing protocol under security attacks.  ...  This paper compares three routing protocols, DSDV, DSR, and AODV under security attack where two types of node misbehaviour have been investigated.  ...  The objective of this paper is to extend this work to compare the performance under security attack of DSR with two other well-known ad hoc routing protocols: DSDV (Destination Sequenced Distance Vector  ... 
doi:10.1109/ias.2007.35 dblp:conf/IEEEias/BoXAMC07 fatcat:w44lry66mveq3icnmwktstk7ou

An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol

Sunil Kumar Yadav, Shiv Om Tiwari
2014 IOSR Journal of Computer Engineering  
We investigating the performance of existing DSR protocol with this new modified security enabled DSR protocol using the performance metrics like throughput, delay and jitter.  ...  In the mobile ad hoc networks, the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node with security.  ...  DSR AND MANET SECURITY PROBLEMS (A) DSR Overview The MANET reactive protocol is known as the Dynamic Source Routing protocol (DSR) which is efficient and very simple one.  ... 
doi:10.9790/0661-16155662 fatcat:wng4b7g2xfgtlipn3umbi34nui

Qualitative and Quantitative Performance Evaluation of Adhoc on Demannd Routing Protocol in Manet

Patil V.P.
2012 IOSR Journal of Electronics and Communication Engineering  
There are several familiar routing protocols like reactive, proactive, hybrid routing protocols which have been proposed for providing communication among all the nodes in the network.  ...  The results shows that there is no routing protocol in the current stage without modifications that can provide efficient routing to any size of network, regardless of the number of nodes and the network  ...  Qualitative metrics These metrics include: i) Security: The wireless environments, along with the nature of the routing protocols in MANETs, which require each node to participate actively in the routing  ... 
doi:10.9790/2834-0253442 fatcat:23gd54caizbjni6l677rlijveu
« Previous Showing results 1 — 15 out of 5,667 results