Comparative analysis of ad hoc routing protocols based on user's point of view

Author(s):  
N. Bilandi ◽  
H. K. Verma ◽  
N. Kumar
2007 ◽  
Vol 30 (11-12) ◽  
pp. 2478-2496 ◽  
Author(s):  
Ha Duyen Trung ◽  
Watit Benjapolakul ◽  
Phan Minh Duc

2022 ◽  
Vol 14 (1) ◽  
pp. 28
Author(s):  
Yelena Trofimova ◽  
Pavel Tvrdík

In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use packet delivery ratios as input to the neural network. In this article, we present a new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols. The novelty of the TARA method is that it does not require changes to the routing protocol itself. Instead, it influences the routing choice from outside by delaying the route request messages of untrusted nodes. The performance of the method was evaluated on the use case of sensor nodes sending data to a sink node. The experiments showed that the method improves the packet delivery ratio in the network by about 70%. Performance analysis of the TARA method provided recommendations for its application in a particular ad hoc network.


2009 ◽  
Vol 15 (6) ◽  
pp. 786-801 ◽  
Author(s):  
Christoph Sommer ◽  
Isabel Dietrich ◽  
Falko Dressler

Sign in / Sign up

Export Citation Format

Share Document