Performance Improvement of DYMO Routing Protocol using Gateway Authentication Technique

نویسندگان

  • Rajesh Gargi
  • Yogesh Chaba
  • R. B. Patel
  • Takeshi Matsuda
  • Hidehisa Nakayama
  • Xuemin Shen
  • Yoshiaki Nemoto
  • Nei Kato
  • Velmurugan Ayyadurai
  • Rajaram Ramasamy
  • Kamaljit I. Lakhtaria
  • Bhaskar N. Patel
  • Pedro Miguel Ruiz Martinez
  • Rafael Marin Lopez
  • Francisco J. Ros
  • Yasir Abdelgadir
  • Azween B. Abdullah
  • Jose L. Munoz
  • Oscar Esparza
  • Carlos Ganan
  • Javier Parra-Arnau
  • Asif Iqbal
  • Jinhua Zhao
  • Ling Wang
چکیده

A hybrid Mobile AdHoc Network (MANET) is provided by gateways (GWs), which connect the MANET to the Internet. Hybrid MANETs are vulnerable to more security threats while routing through the gateways. To guarantee secure hence efficient data routing and transmission, In this paper, we propose to design a data aware secure gateway selection technique for hybrid MANET. In our technique, gateway is classified into two categories as public gateway and protected gateway. Protected gateway can route both public and protected data. Conversely, public gateway can only route public data. Among multiple gateways, a gateway is elected using multi criteria gateway selection strategy. Protected gateway and mobile nodes are authenticated using Extensible Authentication Protocol (EAP). By simulation results, we prove the performance of our technique. This gateway authentication technique improves the routing performance of MANETs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gateway Selection Protocol in Hybrid MANET Using DYMO Routing

In this paper, we propose a novel gateway (GW) selection protocol in hybrid Mobile Ad hoc Networks (MANETs). We focus on the situation that occurs when specialized, sensitive data is sent to the Internet from MANET nodes. These special data types are especially susceptible to security risks such as information leak and data falsification. Therefore, it is necessary for such special data to be f...

متن کامل

Performance of Topology Aware Reliable Routing Protocol for Large Scale Virtual Private Network

A network which merges the usage of the public and the private networks and uses security software for the purpose of compressing, encrypting and masking the digital packets that are being transmitted in the network is called as Virtual Private Network (VPN). In VPN, the communication between the user ends is maintained such that it appears as if the source end is directly linked to the destina...

متن کامل

Evaluating and Comparing Probability of Path Loss in DSDV, OLSR and DYMO at 802.11 and 802.11p

In this paper, we present path loss model for VANETs and simulate three routing protocols; Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR) and Dynamic MANET On-demand (DYMO) to evaluate and compare their performance using NS-2. The main contribution of this work is enhancement of existing techniques to achieve high efficiency of the underlying networks. After e...

متن کامل

A Comparative Study of DYMO, AODV, DSR & DSDV Routing Protocols in VANET

The need to have Intelligent Vehicle System has paved the way for the rapid emergence of Vehicular Adhoc Networks (VANET) which allows communication to take place between the vehicles. The effective implementation of VANET, a sub class of mobile adhoc networks, depends upon the routing protocols used which behave differently under different environments. This paper attempts to study the behavio...

متن کامل

Impact of Radio Propagation Model and Mobility in On-demand Routing Protocol of Manet

Accuracy of routing protocol performance in mobile ad hoc network (MANET) depends on many parameters. Besides many parameters propagation model and node velocity are the two among them. Node mobility is responsible for network topology and propagation model for calculating signal strength at receiver. In wireless network MANET suffers a huge loss in performance due to obstacle between transmiss...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013