Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Coping with communication gray zones in IEEE 802.11b based ad hoc networks
WOWMOM '02 Proceedings of the 5th ACM international workshop on Wireless mobile multimedia
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Implementation experience with MANET routing protocols
ACM SIGCOMM Computer Communication Review
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Link-level measurements from an 802.11b mesh network
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Outdoor experimental comparison of four ad hoc routing algorithms
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Routing in multi-radio, multi-hop wireless mesh networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
System Services for Ad-Hoc Routing: Architecture, Implementation and Experiences
Proceedings of the 1st international conference on Mobile systems, applications and services
Evaluating the communication performance of an ad hoc wireless network
IEEE Transactions on Wireless Communications
Ad hoc networking with directional antennas: a complete system solution
IEEE Journal on Selected Areas in Communications
A survey on position-based routing in mobile ad hoc networks
IEEE Network: The Magazine of Global Internetworking
Scalable routing protocols for mobile ad hoc networks
IEEE Network: The Magazine of Global Internetworking
Characterizing mobile ad hoc networks -: the maniac challenge experiment
Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
ESecRout: An Energy Efficient Secure Routing for Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A method of proactive MANET routing protocol evaluation applied to the OLSR protocol
WiNTECH '11 Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Hi-index | 0.00 |
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security analysis. There has been a lack of work related to the performance of secure routing protocols in real network testbed. In this paper, we present quantitative results for the performance comparisons between AODV and SAODV routing protocols by using a small-scale experimental testbed, which consists of 10 laptops within a 250 m by 100 m rugby field. Apart from outdoor testing, we also compare the results with those obtained via simulation and indoor emulation. The workload includes both UDP and TCP traffic. Results show that SAODV is effective in preventing routing message tampering and data dropping attacks. For outdoor experiments, we also estimate the average distance within a communication gray zone under different bit rates.