Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Lalar, Sachin
- Comparative Study of Routing Protocols in MANET
Abstract Views :200 |
PDF Views:12
Authors
Affiliations
1 Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, IN
1 Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 1 (2017), Pagination: 174-179Abstract
Routing protocol is the essential and vital performance factor in the Mobile Ad-hoc Network. The routing protocols in MANET are accomplished to handle a lot number of nodes with restricted resources. There is a variety of routing protocol exist in MANET. The routing protocol which is chosen may have an effect on the performance of network. In this paper, We perform a comparative study of DSDV, CSGR, WRP, AODV, OLSR, DSR, TORA, ZRP, ZHLS, DYMO routing protocol with respect to Routing Approaches, Routing structure, Route selection, Route, Routing table, Route maintenance, Operation of protocols, Strength, Weakness.Keywords
MANET, Routing Protocol, DSDV, CSGR, WRP, AODV, OLSR, DSR, TORA, ZRP, ZHLS, DYMO.References
- Singh, G. and Singh, A. Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in MANETs. International Journal of Computational Engineering Research (ijceronline. com), 2, 1583-1587, (2012).
- Kaur, R. and Rai, M.K. A Novel Review on Routing Protocols in MANETs. Undergraduate Academic Research Journal (UARJ), 1, 103-108, (2012).
- Dhenakaran, S.S. and Parvathavarthini, A. An Overview of Routing Protocols in Mobile Ad-Hoc Network. International Journal of Advanced Research in Computer Science and Software Engineering, 3, 251-259, (2013).
- H.Ehsan, Z. Uzmi, “Performance comparison of adhoc wireless network routing protocols”, Proceedings of IEEE International Multi-topic Conference (INMIC) 2004
- Panda, I. A Survey on Routing Protocols of MANETs by Using Qos Metrics. International Journal of Advanced Research in Computer Science and Software Engineering, 2, 120-129, (2012).
- Abolhasan, M., Wysocki, T. and Dutkiewicz, E. A Review of Routing Protocols for Mobile Ad Hoc Networks. Ad Hoc Networks, 2, 1-22, (2004). http://dx.doi.org/10.1016/S1570-8705(03)00043-X
- Mbarushimana, C. and Shahrabi, A. (2007) Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks. 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW’07, Niagara Falls, 21-23, 679-684,(2007).
- BR, A.K., Reddy, L.C. and Hiremath, P.S. Performance Comparison of Wireless Mobile Ad-Hoc Network Routing Protocols. IJCSNS International Journal of Computer Science and Network Security, 8, 337-343, (2008).
- Guo, J. and Wang, A. Study on Integration OLSR Protocol in Mobile Ad Hoc Network. Proceedings of the 9th International Symposium on Linear Drives for Industry Applications, 4, 701-708, (2014).
- Bali, S., Steuer, J. and Jobmann, K. (2008) Capacity of Ad Hoc Networks with Line Topology Based on UWB and WLAN Technologies. Wireless Telecommunications Symposium, Pomona, 24-26, 17-24,(2008). http://dx.doi.org/10.1109/WTS.2008.4547538
- Lol, W.G. (2008) An Investigation of the Impact of Routing Protocols on MANETs Using Simulation Modelling. Auckland University of Technology, Auckland.
- Perkins, C.E. and Bhagwat, P. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. ACM SIGCOMM Computer Communication Review, 24, 234-244, (1994).
- Boukerche, A., Turgut, B., Aydin, N., Ahmad, M.Z., Bölöni, L. and Turgut, D. Routing Protocols in Ad Hoc Networks: A Survey. Computer Networks, 55, 3032-3080 (2011). http://dx.doi.org/10.1016/j.comnet.2011.05.010
- Bakht, H. Survey of Routing Protocols for Mobile Ad-Hoc Network. International Journal of Information and Communication Technology Research, 1, 258-207, (2011).
- Royer, E.M. and Toh, C.K. A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Personal Communications, 6, 46-55, (1999). http://dx.doi.org/10.1109/98.760423
- Wan, T., Kranakis, E. and Van Oorschot, P.C. Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). In: Information and Communications Security, Springer, Berlin, 358-374, (2004).
- Dhenakaran, D.S. and Parvathavarthini, A. An Overview of Routing Protocols in Mobile Ad-Hoc Network. International Journal of Advanced Research in Computer Science and Software Engineering, 3, 251-259, (2013).
- Humblet, P.A. Another Adaptive Distributed Shortest Path Algorithm. IEEE Transactions on Communications, 39, 995-1003, (1991). http://dx.doi.org/10.1109/26.87189
- Rajagopalan, B. and Faiman, M.A Responsive Distributed Shortest-Path Routing Algorithm within Autonomous Systems. Journal of Internetworking: Research and Experience, 2, 51-69, (1991).
- Chowdhury, S. A., Uddin, M. A., and Al Noor, S. (2012) A Survey on Routing Protocols and Simulation Analysis of WRP, DSR and AODV in Wireless Sensor Networks.
- Analysis of Clone Detection Approaches in Static Wireless Sensor Networks
Abstract Views :226 |
PDF Views:0
Authors
Affiliations
1 CSE, IKGPTU, Kapurthala, IN
2 CGC, Landran, Punjab, IN
3 A.P., Computer Appl. GTB, Bhawanigarh, IN
1 CSE, IKGPTU, Kapurthala, IN
2 CGC, Landran, Punjab, IN
3 A.P., Computer Appl. GTB, Bhawanigarh, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 3 (2017), Pagination: 653-659Abstract
Wireless Sensor Networks (WSNs) are developing very fast in the wireless networks. The wireless sensor network has the characteristics of limited memory, small size and limited battery. WSNs are vulnerable to the different types of attacks due to its characteristics. One of the attacks is clone node attack in which attacker capture the nodes from the network and stoles the information from it and replicates it in the network. From the clone nodes, the attacker can easily launch the different type of attacks in the network. To detect the clone node, different methods has been implemented .Each method having advantages and limitations. In the this paper, we explain the different methods to detect the clone nodes in the static wireless sensor network and compare their performance based on the communication cost and memory.Keywords
WSN, Clone Attack, Clone Attack Detection, Centralized Approach, Distributed Approach.References
- Yong Wang,Garhan Attebury and Byrav Ramamurthy “A survey of security networks issues in wireless sensor networks”IEEEcommunicationsSuveysandTutorials,vol.8.no.2,2006.
- Ian F.Akyildiz, William Su, Yogis S.Subramaniam and Real Cayirci, “A survey on sensor network”, IEEE Communications Magazine, pp 102-114, August 2002.
- Cris Townsend, Stevan Arms, “Wireless sensor network: principles and applications”, Chapter 22, pp439-449.
- Yan-Xiao Li, Lain-Qin, Ian-Liang, “Research on wireless Sensor network security”, IEEE Computer Society, International Conference on Computational Intelligence and Security, 2010.
- M.Conti, R.DiPietro, L.V.Mancini, A.Mei, “Requirements and open issues in distributed detection of node identity replicas in WSN” ,in SMC’06, 2006, pp.1468–1473.
- J.W.Ho,”Distributed detection of node capture attack in wireless sensor networks”, in smart wireless sensor networks, pages 345-360, 2010
- H.Choi, S.Zhu, T.F.LaPorta, “SET : Detecting node clones in sensor networks” , in:SecureComm’07, 2007, pp.341–350.
- Jun-Won Ho, Dogging Lin, Matthew Wright, SajaiK.Das “Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks”, Preprint submitted Elsevier, March 2009.
- Kai Xing,Fang Liu,Xiuzhen Cheng,David H.C.Du,” Real-time Detection of clone attacks in Wireless Sensor Networks”,IEEE ICDCS 2008
- B.Parno, A.Perrig, V.D.Gligor, “Distributed detection of node replication attacks in sensor networks” , in:S&P’05, 2005, pp.49–63.
- Bio Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia and Sankaradas Roy, “Efficient Distributed Detection of Node Replication Attacks in sensor Networks”,IEEE Computer Society, 23 rd Annual Computer Security Applications Conference,Pages 257 – 266, 2007
- C. Bekara and M. Laurent- Maknavicius,”A New Protocol for securing Wireless Sensor Networks against nodes replication attacks”Third IEEE International Conference on Security and Privacy in communication networks,2008
- Bryan Parno, Adrian Perrig, Virgil Gligor, “ Distributed Detection of Node Replication Attacks in Sensor Networks “, In proceeding of the IEEE Symposium on Security and Privacy , 2005
- Mauro Conti, Roberto Di Pieto, L.V.Mancini and A.Mei,”A Randomized and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks “, Proc.ACM MobiHoc, Pages 80-89, Sept 2007
- Bio Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy and Lingyu Wang “Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks”, IEEE Transactions on Mobile Computing, Vo1 9, No 7, Pages 913-926, July 2010
- Bio Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia and Sankaradas Roy, “Efficient Distributed Detection of Node Replication Attacks in sensor Networks”,IEEE Computer Society, 23 rd Annual Computer Security Applications Conference,Pages 257 – 266, 2007
- Wassim Znaidi, Marine Minjer, Stephane Uheda,”Hierachical Node Replization Attacks Detection in Wireless Sensors networks “IEEE, Pages 82-86, 2009.
- Yingpei Zeng, Jiannong Cao, Shigeng Zhang,Shanqing Gao and Li Xie “Random Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks “, IEEE Journal on selected areas in communications, vol 28, No.5 Pages 677-691, June 2010
- Ming Zhang, Vishal Khanapure, Shigang Chen,Xuelian Xiao, “Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Network” IEEE Pages 284-293, 2009
- Y.Lou,Y.Zhang and S,Liu,”Single hop detection of node clone attacks in mobile wireless sensor networks”, in Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE)2012.