Đang chuẩn bị liên kết để tải về tài liệu:
SecTORA: Empowerment of tora protocol to deal with the elimination of data packets by intruder nodes

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

The simulations carried out showed that the SecTORA protocol was 17.4 percent more efficient than TORA in the networks intruded by attackers; but, this efficiency was 1.47 percent less for the networks which had not been intruded. | International Journal of Computer Networks and Communications Security VOL. 2, NO. 10, OCTOBER 2014, 339–347 Available online at: www.ijcncs.org ISSN 2308-9830 SecTORA: Empowerment of TORA Protocol to Deal with the Elimination of Data Packets by Intruder Nodes Farzad Moradi Saghez Branch, Islamic Azad University, Saghez, Iran E-mail: frzmoradi@gmail.com ABSTRACT One of the attacks that the intruder nodes carry out by penetrating the network is eliminating the data packets, which results in impairing the network efficiency. The method introduced in this paper aims at detecting this attacks and decreasing their effects. The new method is peculiar to those networks which enjoy TCP protocol in their transmission layer. In the present paper one of the famous routing protocols in ad hoc networks, TORA protocol, was studied and the proposed method was implemented on it. A new protocol, called SecTORA, was introduced by changing basic TORA algorithm, which offered two new characteristics: (1) It discovered the routes with intruder nodes by benefiting from the retransmitting characteristic of TCP protocol and the sequence number field in the TCP packet header, (2) It lessened the harmful effects of intruder nodes on omitting the data packets by sending data packets through main and backup paths interchangeably. The simulations carried out showed that the SecTORA protocol was 17.4 percent more efficient than TORA in the networks intruded by attackers; but, this efficiency was 1.47 percent less for the networks which had not been intruded. Keywords: Ad hoc Networks, Routing Protocols, TORA. 1 INTRODUCTION In recent years, Mobile Ad Hoc Network (MANET) has become highly popular and lots of research has been carried out on its different aspects. MANETs are a network of mobile nodes (laptops, sensors, etc.) interacting together without a stable central infrastructure [1]. High degrees of freedom and self-made potentials have made ad hoc networks different from others. Users

TÀI LIỆU LIÊN QUAN