Optimization of AODV and SAODV Routing Protocols in Wireless sensor Networks- Simulation with ns-2
محل انتشار: کنفرانس بین المللی علوم و مهندسی
سال انتشار: 1394
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 495
فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ICESCON01_0492
تاریخ نمایه سازی: 25 بهمن 1394
چکیده مقاله:
The combination of peer to peer wireless links and access points create a backhaul infrastructure called a wireless mesh network (WMN), this backhaul infrastructure works with the nodes in the same network using a common set of routing/forwarding protocols. The access points or routers form a mesh of self-configuring, self-healing links among themselves. The nodes in the WMNs operate in a wireless medium and could be stationary or mobile. This creates interesting parallels between Mobile Ad-hoc Networks (MANET) and WMN. In both the cases the nodes are mobile and communicate directly with each other. In fact WMN can be viewed as MANETs co-existing with other infrastructure to provide wide-scale coverage. The IEEE 11.288s ESS (Extended Service Set) Mesh Networking Task Group is working on creating a standard for WMNs, the routing protocol that they are considering is based on AODV (Ad-Hoc On Demand distance Vector), which has been researched extensively with MANETs. AODV does not provide any security features but it has a secure counterpart SAODV (Secure AODV), which provides security features like integrity and authentication. This project aims to compare and contrast SAODV and AODV by utilizing the NS-.(Optimized Network Engineering Tool) simulation application, to evaluate how SAODV could possibly apply for securing WMN routing messages. A new model for SAODV has been derived from the AODV model in NS-.. Performance is evaluated on the basis of the fraction of packets delivered, the end-to-end delay and routing load for a given traffic and mobility scenario. It is observed that SAODV has comparable results for end-to-end delay and route discovery time with the added security feature.
کلیدواژه ها:
نویسندگان
Masoud Moradi
Young Researchers Club, Department of Electrical Engineering , Ilam Branch, Islamic Azad University, Ilam, Iran
Anvar Hemati
Young Researchers Club, Department of Electrical Engineering , Ilam Branch, Islamic Azad University, Ilam, Iran
مراجع و منابع این مقاله:
لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :