Proceedings of the 1st ACM Workshop on Wireless Multimedia Networking and Performance Modeling 2005
DOI: 10.1145/1089737.1089757
|View full text |Cite
|
Sign up to set email alerts
|

Experimental comparisons between SAODV and AODV routing protocols

Abstract: There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security analysis. There has been a lack of work related to the performance of secure routing protocols in real network testbed. In this paper, we present quantitative results for the performance comparisons between AODV and SAODV routing protocols by using a small-scale experimental testbed, which consists of 10 laptops within a 250 m by 100 m ru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…Among papers that experimentally assess the performance of proactive MANET routing protocols, the most common evaluative metric was throughput, typically TCP throughput [2,4,7,9,12,13,16]. Other popular metrics were packet delivery or loss rates [1,3,7,10,13,20], "ping" success rates [4,20], latency [1,9,10], overhead [3,10,13], and average hop count [10].…”
Section: Previous Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Among papers that experimentally assess the performance of proactive MANET routing protocols, the most common evaluative metric was throughput, typically TCP throughput [2,4,7,9,12,13,16]. Other popular metrics were packet delivery or loss rates [1,3,7,10,13,20], "ping" success rates [4,20], latency [1,9,10], overhead [3,10,13], and average hop count [10].…”
Section: Previous Workmentioning
confidence: 99%
“…Other popular metrics were packet delivery or loss rates [1,3,7,10,13,20], "ping" success rates [4,20], latency [1,9,10], overhead [3,10,13], and average hop count [10]. We could not find any further evaluation of protocol performance in an experimental setting.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we analyze the security threats and show how the ESecRout protocol mitigates these threats. Several attacks [4,16] can be launched against the routing in the sensor network such as:…”
Section: Security Analysismentioning
confidence: 99%
“…Addressing the security of a routing protocol is crucial to enhance the reliability of the network [16][17][18]. In the past, researchers have proposed various secure versions of the traditional routing protocols, e.g., S-AODV [19], SOLSR [20], and S-DYMO [21]; a survey of these approaches can be found in [22][23][24]. Node addressing, lookup, and routing mechanisms in the DHT-based routing protocols are different from the traditional routings, which raise new security issues that may degrade the performance and reliability of the network.…”
Section: Introductionmentioning
confidence: 99%