2015
DOI: 10.1016/j.comnet.2015.02.032
|View full text |Cite
|
Sign up to set email alerts
|

REFRAHN: A Resilience Evaluation Framework for Ad Hoc Routing Protocols

Abstract: Routing protocols are key elements for ad hoc networks. They are in charge of establishing routes between network nodes efficiently. Despite the interest shown by the scientific community and industry in converting the first specifications of ad hoc routing protocols in functional prototypes, aspects such as the resilience of these protocols remain generally unaddressed in practice. Tackling this issue becomes critical given the increasingly variety of accidental and malicious faults (attacks) that may impact … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…The Throughput charge [13]was raised to about 61.8% when there have been grey gap nodes randomly constant at a range of location at all stop time as 2, 4, 6,8seconds individually. In presence of grey gap nodes, the whole data loss price of Ad-hoc on demand distance vector protocol [16] achieved was14.7%.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Throughput charge [13]was raised to about 61.8% when there have been grey gap nodes randomly constant at a range of location at all stop time as 2, 4, 6,8seconds individually. In presence of grey gap nodes, the whole data loss price of Ad-hoc on demand distance vector protocol [16] achieved was14.7%.…”
Section: Resultsmentioning
confidence: 99%
“…However, in the proposed mechanism, the special residences of the actual and lattice Route Request are no longer separated from the malicious or sufferer nodes. [13] The writer used multipath forwarding technological know-how to observe assaults on a wisensor community based totally on the selective forwarding assault process. The attackers have been no longer detected and correctly remoted between the networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Friginal et al [13] proposed a security framework named Resilience Evaluation Framework for Ad Hoc routing protocols (REFRAHN) based on the insertion of malicious faults and quantitatively evaluated their effect on routing protocols. The primary goal of REFRAHN is to (i) minimize the uncertainty in the sources while deploying ad hoc routing protocols, (ii) devise fault-tolerant mechanisms that tackle and reduce such problems, and (iii) compare and choose the routing protocol that optimizes the robustness and performance of the network.…”
Section: Related Workmentioning
confidence: 99%
“…It displays that to validate ''Y'', many other properties are essential for a secure signature algorithm. W = s −1 mod n(13) P1 = (h(m) * w)mod n(14)…”
mentioning
confidence: 99%
“…There are various factors that will impact the performance of this network. As stated in works like [50] [52], an important factor that should be considered when deploying an ad hoc network is the routing protocol used. Thus, being able to determine which routing protocol improves the performance of the network in such harsh conditions can make a difference.…”
Section: Introductionmentioning
confidence: 99%