Using particle swam optimization for QoS in ad-hoc multicast
Engineering Applications of Artificial Intelligence
Simulation and analysis of ad-hoc on-demand distance vector routing protocol
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Hi-index | 0.25 |
Mobile ad hoc networks pose new kinds of security problems, caused by their nature of collaborative and open systems and by limited availability of resources. In this article, we consider a Wi-Fi connectivity data link layer as a basis and focus on routing security. We discuss our implementation of the secure AODV protocol extension, which includes tuning strategies aimed at improving its performance. Namely, we propose an adaptive mechanism that tunes SAODV behavior. Moreover, we analyze our adaptive strategy and another technique that delays the verification of digital signatures. This article sums up the experimental results we collected in the prototype design, implementation, and tuning.