Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols

An ad hoc network is formed by mobile computers (nodes) with wireless interfaces that communicate amongst themselves without the help of any infrastructure. Due to their characteristics, the ad hoc networks are prone to the presence of malicious nodes that can degrade the performance. This fact motivated the appearance of security protocols that implement mechanisms to avoid attacks like DoS. This article accomplished a verification of the impact caused in the performance of the ad hoc networks with the use of security protocols (SEAD and Ariadne) in relation to the use of protocols that don't have security mechanisms (DSDV and DSR). First an ad hoc network is simulated using these routing protocols and soon afterwards a comparative study is accomplished through graphs of the values obtained for each basic QoS metrics

[1]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[2]  G.S. Yovanof,et al.  Performance evaluation of security-aware routing protocols for clustered mobile ad hoc networks , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..

[3]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[4]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[5]  Yih-Chun Hu,et al.  Securing quality-of-service route discovery in on-demand routing for ad hoc networks , 2004, SASN '04.

[6]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[7]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[8]  Klara Nahrstedt,et al.  Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..

[9]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[11]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[12]  Samir Ranjan Das,et al.  Dead reckoning in mobile ad hoc networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[13]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[14]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[15]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[16]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[17]  Luiz A. DaSilva,et al.  Network mobility and protocol interoperability in ad hoc networks , 2004, IEEE Communications Magazine.

[18]  Dharma P. Agrawal,et al.  Mobile Ad hoc Networking , 2002 .

[19]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[20]  Anup Kumar,et al.  An Adaptive and Predictive Security Model for Mobile Ad hoc Networks , 2004, Wirel. Pers. Commun..