Analytical Model and Performance Evaluation for the TRIDNT protocol
نویسندگان
چکیده
In Mobile ad-hoc networks, nodes must cooperate to achieve the routing functions. Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding the most efficient path. A Two node-disjoint Routes scheme for Isolating Dropper Node (TRIDNT) protocol has been proposed in [13]. The protocol uses an incentive mechanism for selfish node to declare its selfishness behavior and also use two node-disjoint routes to reduce the malicious searching time. In this paper, we give an analytical model and performance evaluation for the TRIDNT protocol. First we calculate the time taken to detect the malicious node in the routing path. Second we will drive an expression for the expected attempt time until finding a misbehaving free route, and calculate the probability of failing in finding a misbehaving-free route in case of limited number of attempts. Finally, the connection request blocking probability and per flow throughput are calculated. The performance of the proposed TRIDNT protocol is compared with the TWOACK and Muhammad Zeshan protocols. The results indicate that under a low threshold and low traffic intensity conditions the TWOACK and Muhammad Zeshan protocols have a malicious searching time little greater than that of TRIDNT, but with high probability of false reporting of legitimate nodes as misbehaving nodes due to small threshold value and without differentiating between selfish node and malicious nodes. The expected attempt time of TRIDNT protocol have the smallest value because it allows a controlled degree of node selfishness which gives the selfish node the incentive to declare itself and reduce the path diagnosis time, and save the misbehaving detection time. Also TRIDNT protocol has a smaller limited-attempts-based connection blocking probability than TWOACK and Muhammad Zeshan protocols, but has a higher connection request blocking probability than the other two protocols. Finally because per flow throughput is inversely proportional to the expected attempt time, so TRIDNT has the highest per flow throughput. Then we say that TRIDNT protocol can find and isolate the malicious node in small amount of time without using of promiscuous listening, which results in improving the per flow throughput and improving the overall throughput performance of MANET. Keyword: Analytical model, Trust-Based routing Performance evaluation, Ad Hoc Network, Secure Routing Protocol, network security.
منابع مشابه
Modeling and Performance Evaluation of Energy Consumption in S-MAC Protocol Using Generalized Stochastic Petri Nets
One of the features of wireless sensor networks is that the nodes in this network have limited power sources. Therefore, assessment of energy consumption in these networks is very important. What has been common practice has been the use of traditional simulators to evaluate the energy consumption of the nodes in these networks. Simulators often have problems such as fluctuating output values i...
متن کاملSpectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملReliability and Performance Evaluation of Fault-aware Routing Methods for Network-on-Chip Architectures (RESEARCH NOTE)
Nowadays, faults and failures are increasing especially in complex systems such as Network-on-Chip (NoC) based Systems-on-a-Chip due to the increasing susceptibility and decreasing feature sizes. On the other hand, fault-tolerant routing algorithms have an evident effect on tolerating permanent faults and improving the reliability of a Network-on-Chip based system. This paper presents reliabili...
متن کاملEvaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks
The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...
متن کاملTwo comparative MCDM approaches for evaluating the financial performance of Iranian basic metals companies
Due to the increasing competition and the continuous changes in current business environments, appropriate evaluation of the companies' performance is a useful tool not only for themselves but also for their own investors and creditors. In this paper, a model is presented for evaluating the basic metals producing companies. The proposed model based on analyzing the financial ratios is a combina...
متن کامل