Beruflich Dokumente
Kultur Dokumente
March 2014
www.ijsret.org
ABSTRACT
In many kind of mobile network environment,
nodes are communicated on the basis of their persistent
public identities. In some kind of suspicious MANET
settings, node identities should be kept as secret and
node movements must not be guessable. Since the nodes
need to communicate by only the way of their current
locations, it is necessary to construct a secure map of
locations. By using that current map, every node will
decide which other nodes it wants to communicate with.
ALARM takes advantage of anonymity and intractability
(tracking-resistance). Anonymous Location Aided
Routing protocol for Manets (ALARM) is the protocol
which uses their location and creates map for packet
transformation. In this paper, the goal is to analyze the
two ALARM protocols (DSDV & AODV) in the view
of node identity protection and performance. The aim is
to determine the performance measures like throughput,
packet delivery ratio and delay that are commonly used
in MANET by evaluating these ALARMS routing
protocols- DSDV & AODV
General Terms: MANET, DSDV, AODV
N.Chitra Devi
Assistant Professor
Dept of Computer Science & Engineering
P.S.R Rengasamy College of Engineering for Women,
Sivakasi-626 140
1. INTRODUCTION
IJSRET @ 2014
March 2014
www.ijsret.org
3. RELATED WORK
Routing in MANETS has attracted a lot of
attention from the networking and security research
community. There are numerous proposals for secure
on-demand routing, such as SRDP [2], Ariadne [3], and
SEAD [4]. They focus mainly on securing route
discovery and route maintenance against node
impersonation, as well as modification and fabrication of
routing information. A comprehensive survey of secure
on demand ad-hoc routing techniques can be found in
[8] and [9].
It will not consider node privacy and
anonymity. Other research results have yielded
anonymous on demand routing protocols, such as
MASK [11], ANODR [12], ARM [14] and ODAR [15].
These protocols use pseudonyms for node identification
and addressing but none of them utilizes location
information for routing. Location-based routing
protocols mainly focus on improving the performance of
the routing protocol and minimizing overhead by
utilizing location information to deliver routing control
messages in MANETs without flooding the whole
network. Some notable techniques include [2], [17] and
[18]. To the best of our knowledge, there have been no
proposals for location-based proactive routing protocols
that preserve node anonymity and privacy.
4.
A.
DESTINATION
SEQUENCED
DISTANCE VECTOR ROUTING PROTOCOL
(DSDV)
March 2014
B.
AD-HOC ON DEMAND DISTANCE
VECTOR ROUTING PROTOCOL (AODV)
Ad hoc On Demand Distance Vector (AODV)
routing is a routing protocol for mobile ad hoc networks
and other wireless ad hoc networks. It is jointly
developed in Nokia Research Centre of University of
California, Santa Barbara and University of Cincinnati
by C. Perkins and S. Das. It is an on demand and
distance vector routing protocol, meaning that a route is
established by AODV from a destination only on
demand. AODV is capable of both unicast and multicast
routing. It keeps these routes as long as they are
desirable by the sources. Additionally, AODV creates
trees which connect multicast group members. The trees
are composed of the group members and the nodes
needed to connect the members. The sequence numbers
are used by AODV to ensure the freshness of routes. It is
loop free, self starting, and scales to large numbers of
mobile nodes. AODV defines three types of control
messages for route maintenance. RREQ- A route request
message is transmitted by a node requiring a route to a
www.ijsret.org
BROADCAST
ID
SOURCE
SEQUENCE
NO.
DESTINATION
ADDRESS
DESTINATION
SEQUENCE NO.
HOP COUNT
IJSRET @ 2014
March 2014
5. PERFORMANCE MEASURES
The performance measures are used to evaluate
the effectiveness of Ad hoc routing protocols. It includes
Throughput, Packet Delivery Ratio (PDR), End to End
Delay and Routing Protocol Overhead. The Routing
Protocol providing high throughput, high Packet
www.ijsret.org
Average Delay =
Total no of received packets
IJSRET @ 2014
March 2014
www.ijsret.org
6. SIMULATION RESULTS
Experimental Results of DSDV
DSDV requires a regular update of its routing
tables, which uses up battery power and a small amount
of bandwidth even when the network is idle. This limits
the number of nodes that can join the network.
Whenever the topology of the network changes, a new
sequence number is necessary before the network re
converges and DSDV is unstable until update packets
propagate through the network. For this reason DSDV is
not suitable for highly dynamic networks.
March 2014
www.ijsret.org
REFERENCES
March 2014
www.ijsret.org
IJSRET @ 2014