Creating a cost-effective air-to-ground network simulation environment

Author(s):  
Lem R. Soles ◽  
Thomas Reichherzer ◽  
Dallas H. Snider
Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

This article aims to secure a routing mechanism by completing amendments in previously proposed efficient secure routing (ESR) protocols against networking layer attacks in mesh networking environments. Along with generating the tickets to prove the authenticity of communicating clients, each node proves the legitimacy of its succeeding node by computing the behaviour. The intermediate nodes selected for routing the data packets proves the legitimacy of each other by getting the passive acknowledgement process within a predefined time to live (TTL) time. Further, grey hole and black hole attacks are considered in the network simulation environment as they drastically affect the network metrics during the communication because of their severe attacking characteristics. The proposed mechanism is validated over conventional routing mechanisms against packet loss and network delay parameters in the presence of black hole and grey hole routing attacks.


2010 ◽  
Vol 20 (4) ◽  
pp. 654-665 ◽  
Author(s):  
Miguel L. Bote-Lorenzo ◽  
Juan I. Asensio-Pérez ◽  
Eduardo Gómez-Sánchez ◽  
Guillermo Vega-Gorgojo ◽  
Carlos Alario-Hoyos

Sign in / Sign up

Export Citation Format

Share Document