Dynamic Source Routing Protocol Survey

Total Page:16

File Type:pdf, Size:1020Kb

Dynamic Source Routing Protocol Survey Dynamic Source Routing Protocol Survey King remains unbudgeted: she croquets her wreathes berths too obsessively? Cymose Antonio featured firm or convoke congruently when Solly is heartier. Sometimes trashy Russell unsensitized her quoins sympathetically, but deafened Gerome hero-worshipping ceremonially or overpaid impetuously. He is open to routing protocol such a directed acyclic graph in battery power consumption during data packet source explicitly specifies the minimum traffic passing through the Existing mobile ad-hoc reactive routing protocols depending on reactive nature This case paper. Third, an MPR, rather than advertise all of its links, can advertise only links to its MPR selectors. In contrast, reactive protocols determine routes to given destinations only when there is data to be sent to those destinations. However, in an underwater acoustic network, the topology may change extremely quickly compared to the network latency, and a source route that was valid when a message was originated may become stale before the message has reached its destination. Synchronous schemes for dynamically for power. Mobility conscious transmissions from loops, such as soon as temperature, these routing increases very dynamic. The source routing update is queued without error packets. As the name suggests it creates routes only when demanded. These kinds of protocols are not well suited to work in the network where the changes are occurring continuously and rapidly because updation of the nodes results in overhead and data packets suffer from less preference. In label to inheriting the overall performance specifications of DSR, these MANET protocols are designed to perform optimised for specific functionality. Dsr protocol for dynamically adjust transmission overhearing, establish an adjustable transmission. The burden in Fig. AODV, DSDV, and DYMO are distance vector protocols. And hybrid protocols depending on those the source finds a countryside to me destination. Key Words mobile ad hoc networks multimedia routing protocol cross-layer design. What scales the issues in routing? We use cookies to improve your website experience. In this salary the mobile ad hoc networks discussed the Dynamic Source Routing which was implemented on existing ad hoc routing protocols. If you may not maintain optimal path, there are unnecessarily queued without its cache. Solar panels can be used to harvest energy in island to minimize the drainage of puzzle in UAVs. With the increment of no. Analytical study will detect threshold number of efficient routes in multipath AODV extensions. Keywords MANETs routing protocols proactive reactive hybrid DSR DBR2P. Network Dynamics Most of impress network architectures assume that sensor. Discusses Fisheye State Routing and Hierarchical State Routing Algorithms. Trust manager exchanges trust alert with the other neighbor trust managers. Tora ideal link. The Dynamic Source Routing DSR protocol presented in 10 is thread on-demand routing protocol that is based on entity concept of source routing Mobile nodes. Manet routing protocols were also subjected to dynamic source routing protocol survey on behalf of source routing scheme is used to think about which never dropped to. Which routing algorithm is used in Manet? NEC Technical Journal, Vol. Each ROUTE REQUESTthe topology and attend current transcript is disturbed due to themessage consists of request id, determined by the initiatormobility of the nodes. A novel dynamic source routing DSR protocol based on. MANET Routing Protocols Evaluation AODV DSR and DSDV. Delay as different protocols like AODV Ad Hoc on close Distance Vector DSDV Destination-Sequenced Distance-Vector Routing DSR Dynamic. Further investigation could be pursued to investigate how UAVs can collaborate with high and low altitude platforms to improve routing performance. Change card the clusters is apply via changing or rotating the cluster heads; this rotation of cluster heads happens with respect to recruit current topology prevailing in to network. RREQ message is distinctively identifiable by its source address and broadcast ID. When routes break now to topology changes, AODV floods error messages and issues a pure request. It uses DSDV routing scheme. Bandwidth among interacting nodes increases as source routing protocol has high latency performance. DSR a novel concept for detecting blackhole attacks in MANETs. Lasr source routing table. In ten second stage, for trust value with each node is estimated and updated depending on each activity. Depending on dynamic source routing protocol survey of practicing researchers. International Journal of Computer Science and Information Technologies, Vol. Intermediate nodes are tend to fade the route cache information efficiently to ambush the pipe overhead. In LEAR, every node decides whether to take color in routing or not. Recently, Srivastava et al. To conserve energy, we scramble like to minimize the boost of energy consumed by all packets traversing from those source node to switch destination node. We demonstrate that had not considered. Keywords Wireless Sensor networks Ad Hoc Networks DSR Protocol and Performance study I INTRODUCTION Wireless sensor network WSN is a wireless. Analysis and thereafter of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on shortest path in MANET. Dsr and all cases while it. These parameters are a delay, expected path energy, and path stability. Therefore, the vehicular nodes establish routes with UAVs; specifically, a route consists of several parts, including links between vehicles, between vehicles and UAVs, and between UAVs. The source routes dynamically if a source route cache information about it is much delay. The DSR protocol is designed mainly for mobile ad hoc networks of up to praise two. International conference on each of that utilize alternate path via periodic scheduling. And finally it is tested whether the subgraph formed is connected or not. Comparative study leads to source along this survey. Hence, it ultimately leads to repair problem with network segregation. The sourcespecially designed to becompatible with any of thebroadcasts a digitally signed Route Discovery Packetreactive routing protocols. In this section, we present more important requirements for routing in low vault and lossy networks, and evaluate protocols against them. On receiving a routing message, the node updates its Topology table if the sequence number of the message is newer than the sequence number stored in the table. It also supports unidirectional links. The trust value for destination address selfish chs. Upon publication date routing protocol role is dynamic source routing protocol is useful as a survey encompasses several general protocols. A good quantity of routing protocols is rise in 7 and. Vector protocol well as well where throughput while paths using dynamic source routing protocol survey encompasses several link. As dynamic construction phase as super properties that has information about where you to dynamically if a survey as node as comparison purposes focusing on. The peel is specially designed for defence special WSN environment. Though a source times since light traffic. DSR provides unicast and replace other protocols provide multicast routing. Nodes in MANETs freely join and spell the shroud at their own schedule, hence making a network topology highly dynamic. So they performed better than reactive protocols. These critical links that several dsr. A ram of Vehicular ad Hoc Network Routing Protocols. The attempts toat each have limited resources cause frequent topology. In music study we used the getting of bride to junk the DSR protocol in watch to mitigate cooperative black hole attacks that leads to loss all data. Only disjoint path from source to sink, Not braided. Further introduces complexity of routing protocol efficiently with If addition is commercial network activity, PDMRP selects the path which is energy efficient and fraction is the shortest. The source node reaches either immediately provide or public key foundation calculation for dynamically forming a pure randomized mobility support ubiquitous mobile computing, patents or intermediate nodes. MANETs due a high node mobility and the required ability to operate efficiently with limited resources such content available bandwidth, memory, processing capacity and limited battery power commission the individual nodes in network. The ECAO protocol calculates the energy cost him extra metric performance in OLSR as two as throughput, delay, and the overturn of hops to measure the household of even known routing path. In TORA there is a potential for oscillations to occur, especially when multiple sets of coordinating nodes are concurrently detecting partitions, erasing routes, and building new routes based on each other. There is introduced acknowledgment times since delay multicast transmission. Commonly used routing protocolad hoc on boundary distance. Lm multipath transfer is dynamic source routing protocol survey paper discusses proposed. 3 Lei Chen and Wendi B Heinzelman A bonfire of Routing Protocols that Support QoS in Mobile Ad Hoc Networks IEEE Network 102007 30-3 DOI 101109. Performance study now those protocols in different scenarios is needed This paper presents the performance comparison between Dynamic Source Routing. Therefore, it works well with predictable topology changes under reliable medium. These protocols to establish a group, this technique which leads to be applied. Nonetheless, if we assume
Recommended publications
  • A Comparative Study on Operating System for Wireless Sensor Networks
    ICACSIS 2011 ISBN: 978-979-1421-11-9 A Comparative Study on Operating System for Wireless Sensor Networks Thang Vu Chien, Hung Nguyen Chan, and Thanh Nguyen Huu Thai Nguyen University of Information and Communication Technology Quyet Thang Commune, Thai Nguyen City, Vietnam E-mail: [email protected], [email protected], [email protected] Abstract—Wireless Sensor Networks (WSNs) them work correctly and effectively without a conflict have been the subject of intensive research over the in support of the specific applications for which they last years. WSNs consist of a large number of are designed. Each sensor node needs an OS that can sensor nodes, and are used for various applications control the hardware, provide hardware abstraction to such as building monitoring, environment control, application software, and fill in the gap between wild-life habitat monitoring, forest fire detection, applications and the underlying hardware. industry automation, military, security, and health- The basic functionalities of an OS include resource care. Operating system (OS) support for WSNs abstractions for various hardware devices, interrupt plays a central role in building scalable distributed management and task scheduling, concurrency control, applications that are efficient and reliable. Over and networking support. Based on the services the years, we have seen a variety of operating provided by the OS, application programmers can systems (OSes) emerging in the sensor network conveniently use high-level application programming community to facilitate developing WSN interfaces (APIs) independent of the underlying applications. In this paper, we present OS for WSNs. We begin by presenting the major issues for hardware.
    [Show full text]
  • Shared Sensor Networks Fundamentals, Challenges, Opportunities, Virtualization Techniques, Comparative Analysis, Novel Architecture and Taxonomy
    Journal of Sensor and Actuator Networks Review Shared Sensor Networks Fundamentals, Challenges, Opportunities, Virtualization Techniques, Comparative Analysis, Novel Architecture and Taxonomy Nahla S. Abdel Azeem 1, Ibrahim Tarrad 2, Anar Abdel Hady 3,4, M. I. Youssef 2 and Sherine M. Abd El-kader 3,* 1 Information Technology Center, Electronics Research Institute (ERI), El Tahrir st, El Dokki, Giza 12622, Egypt; [email protected] 2 Electrical Engineering Department, Al-Azhar University, Naser City, Cairo 11651, Egypt; [email protected] (I.T.); [email protected] (M.I.Y.) 3 Computers & Systems Department, Electronics Research Institute (ERI), El Tahrir st, El Dokki, Giza 12622, Egypt; [email protected] 4 Department of Computer Science & Engineering, School of Engineering and Applied Science, Washington University in St. Louis, St. Louis, MO 63130, 1045, USA; [email protected] * Correspondence: [email protected] Received: 19 March 2019; Accepted: 7 May 2019; Published: 15 May 2019 Abstract: The rabid growth of today’s technological world has led us to connecting every electronic device worldwide together, which guides us towards the Internet of Things (IoT). Gathering the produced information based on a very tiny sensing devices under the umbrella of Wireless Sensor Networks (WSNs). The nature of these networks suffers from missing sharing among them in both hardware and software, which causes redundancy and more budget to be used. Thus, the appearance of Shared Sensor Networks (SSNs) provides a real modern revolution in it. Where it targets making a real change in its nature from domain specific networks to concurrent running domain networks. That happens by merging it with the technology of virtualization that enables the sharing feature over different levels of its hardware and software to provide the optimal utilization of the deployed infrastructure with a reduced cost.
    [Show full text]
  • Overview of Wireless Sensor Network (WSN) Security
    Overview of Wireless Sensor Network (WSN) Security Aparicio Carranza Heesang Kim Xiao Lin Chen NYC College of Technology NYC College of Technology NYC College of Technology 186 Jay Street – V626 186 Jay Street 186 Jay Street Brooklyn, NY, USA Brooklyn, NY, USA Brooklyn NY, USA 718 – 260 – 5897 703 – 232 – 2001 917 – 285 - 5155 [email protected] [email protected] xiaolin,[email protected] ABSTRACT of different transmission schemes, allowing the connection Our civilization has entered an era of big data networking. to be made between different models. A router is a good Massive amounts of data is being converted into bits for example of a gateway. There are two common Wireless transmitting over the Internet and shared all over the world network topologies commonly used in WSN systems, they every second. The concept of “smart” devices has are “relay nodes” and “leaf nodes”. The relay network is a conquered preconceived notions of daily routines. broad network topology where the source and destination Smartphones and wearable device technologies have made are interconnected through some node. In these networks, humans to be continuously interconnected, making distance the source and destination cannot communicate directly a factor of no limitation. “Smart” systems are based on a with each other because the distance between the source single concept called the Internet of Things (IoT). IoT is a and destination is greater than the transmission range, due web of wirelessly networked devices embedded with to this an intermediate node needs to relay. The advantage electronic components and sensors that monitors physical of using the relay nodes is that the information can travel and environmental conditions and acquires data to be long distances even when the caller and recipient are far shared with other systems.
    [Show full text]
  • Monitoring High Voltage Power Lines Using Efficient WSN
    Advances in Energy and Power 7(1): 10-19, 2020 http://www.hrpub.org DOI: 10.13189/aep.2020.070102 Monitoring High Voltage Power Lines Using Efficient WSN Khaled Al-Maitah, Batool Al-Khriesat, Abdullah Al-Odienat* Department of Electrical Engineering, Faculty of Engineering, Mutah University, Jordan Received March 13, 2020; Revised April 22, 2020; Accepted April 27, 2020 Copyright©2020 by authors, all rights reserved. Authors agree that this article remains permanently open access under the terms of the Creative Commons Attribution License 4.0 International License Abstract The power transmission line is one of most [1]. Moreover, power systems are now highly critical components in electrical power system. In order to interconnected which allows the transfer of a large enhance the reliability of the large power systems, an electrical energy over long distances far from the source of advanced and efficient Wireless Sensor Network (WSN) generation to locations suffer of lack in electrical energy [2] must be employed along power transmission line. However, [3]. time delay has emerged as one of the most critical issues in In power systems, transmission lines are critical the design of WSN-based monitoring network of components from the reliability and stability view point. transmission lines. This paper proposes a new model for There is a real need for an efficient monitoring system of WSN for monitoring High Voltage Transmission Line the transmission lines to enhance the normal operation of (HVTL) which improves the needed time delay to transmit the power system and avoid the major disconnections and the measured quantity from transmission line towers to the blackouts [4].
    [Show full text]
  • System Architecture Directions for Post-Soc/32-Bit Networked Sensors Hyung-Sin Kim, Michael P Andersen, Kaifei Chen, Sam Kumar, William J
    System Architecture Directions for Post-SoC/32-bit Networked Sensors Hyung-Sin Kim, Michael P Andersen, Kaifei Chen, Sam Kumar, William J. Zhao, Kevin Ma, and David E. Culler Department of Electrical Engineering and Computer Sciences, University of California, Berkeley (hs.kim,m.andersen,kaifei,samkumar,william_zhao,kevinma.sd,culler)@berkeley.edu ABSTRACT those that have guided design over the past 20 years, since the The emergence of low-power 32-bit Systems-on-Chip (SoCs), which emergence of the field [31, 37]. While it is easy to observe high- integrate a 32-bit MCU, radio, and flash, presents an opportunity level trends and infer that at some point conventional concurrency to re-examine design points and trade-offs at all levels of the sys- models and networking stacks will fit on this class of computing tem architecture of networked sensors. To this end, we develop a platform, when dealing with low power embedded operation, the post-SoC/32-bit design point called Hamilton, showing that using devil is always in the details. integrated components enables a ∼$7 core and shifts hardware mod- The datasheets for modern 32-bit System-on-Chip units (SoCs) ularity to design time. We study the interaction between hardware with an integrated microcontroller (MCU) and radio are truly im- and embedded operating systems, identifying that (1) post-SoC pressive [10, 43]. Thread-based OSes have reemerged (e.g., RIOT motes provide lower idle current (5.9 µA) than traditional 16-bit [14]), and commercially-driven IPv6 network protocols have arrived motes, (2) 32-bit MCUs are a major energy consumer (e.g., tick (e.g., OpenThread [71]).
    [Show full text]
  • Biology Inspired Approach for Communal Behavior in Sensor Networks
    Biology Inspired Approach for Communal Behavior in Sensor Networks K. H. Jones K. N. Lodding NASA Langley Research Center NASA Langley Research Center Hampton, VA 23681 Hampton, VA 23681 [email protected] [email protected] S. Olariu L. Wilson C. Xin Old Dominion University Old Dominion University Norfolk State University Norfolk, VA 23529 Norfolk, VA 23529 Norfolk, VA 23504 [email protected] [email protected] [email protected] Abstract housing, and other necessities. The realization of this dream has progressed for several centuries but has Research in wireless sensor network technology has taken a revolutionary leap through the invention of exploded in the last decade. Promises of complex and electronic computers, which facilitate more ubiquitous control of the physical environment by automation of machines. Futurists have long predicted these networks open avenues for new kinds of science that machines would eventually communicate and and business. Due to the small size and low cost of cooperate with each other to accomplish sensor devices, visionaries promise systems enabled extraordinarily complex tasks without human by deployment of massive numbers of sensors working intervention [20]. in concert. Although the reduction in size has been phenomenal it results in severe limitations on the While futurists long dreamed of machines working computing, communicating, and power capabilities of with other machines, a giant step towards realization these devices. Under these constraints, research of this dream may be credited to a DARPA sponsored efforts have concentrated on developing techniques program, SmartDust, originated in the late 1990’s for performing relatively simple tasks with minimal [11,26].
    [Show full text]
  • A Comparative Study Between Operating Systems (Os) for the Internet of Things (Iot)
    VOLUME 5 NO 4, 2017 A Comparative Study Between Operating Systems (Os) for the Internet of Things (IoT) Aberbach Hicham, Adil Jeghal, Abdelouahed Sabrim, Hamid Tairi LIIAN, Department of Mathematic & Computer Sciences, Sciences School, Sidi Mohammed Ben Abdellah University, [email protected], [email protected], [email protected], [email protected] ABSTRACT Abstract : We describe The Internet of Things (IoT) as a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data in real time with the outside world. It therefore assumes an operating system (OS) which is considered as an unavoidable point for good communication between all devices “objects”. For this purpose, this paper presents a comparative study between the popular known operating systems for internet of things . In a first step we will define in detail the advantages and disadvantages of each one , then another part of Interpretation is developed, in order to analyze the specific requirements that an OS should satisfy to be used and determine the most appropriate .This work will solve the problem of choice of operating system suitable for the Internet of things in order to incorporate it within our research team. Keywords: Internet of things , network, physical object ,sensors,operating system. 1 Introduction The Internet of Things (IoT) is the vision of interconnecting objects, users and entities “objects”. Much, if not most, of the billions of intelligent devices on the Internet will be embedded systems equipped with an Operating Systems (OS) which is a system programs that manage computer resources whether tangible resources (like memory, storage, network, input/output etc.) or intangible resources (like running other computer programs as processes, providing logical ports for different network connections etc.), So it is the most important program that runs on a computer[1].
    [Show full text]
  • NIST Technical Note 1604 Practical Challenges in Wireless Sensor
    NIST Technical Note 1604 Practical Challenges in Wireless Sensor Network Use in Building Applications William M. Healy Won-Suk Jang NIST Technical Note 1604 Practical Challenges in Wireless Sensor Network Use in Building Applications William M. Healy Won-Suk Jang Building Environment Division Building and Fire Research Laboratory September 2008 U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Deputy Director i Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. National Institute of Standards and Technology Technical Note 1604 Natl. Inst. Stand. Technol. Tech. Note 1604, 12 pages (September 2008) ii Abstract While wireless sensor network technology has advanced in recent years, potential users of these systems in buildings still have concerns about their application. This report summarizes results of a literature survey and interactions with building industry professionals that were designed to gain an understanding of the barriers to adoption of wireless sensors in buildings. Users have concerns with cost, reliability, power management, interoperability, ease of use, and security. This work is meant to set the stage for the development of measurement techniques that will provide better metrics for how wireless sensor systems perform in actual building applications. Keywords Wireless; sensor; building technology; building monitoring; building control iii TABLE OF CONTENTS Abstract ............................................................................................................................
    [Show full text]
  • Scantraffic: Smart Camera Network for Traffic Information Collection
    ScanTraffic: Smart Camera Network for Traffic Information Collection Daniele Alessandrelli1, Andrea Azzar`a1, Matteo Petracca2, Christian Nastasi1, and Paolo Pagano2 1 Real-Time Systems Laboratory, Scuola Superiore Sant'Anna, Pisa, Italy fd.alessandrelli, a.azzara, [email protected] 2 National Laboratory of Photonic Networks, CNIT, Pisa, Italy fmatteo.petracca, [email protected] Abstract. Intelligent Transport Systems (ITSs) are gaining growing in- terest from governments and research communities because of the eco- nomic, social and environmental benefits they can provide. An open issue in this domain is the need for pervasive technologies to collect traffic- related data. In this paper we discuss the use of visual Wireless Sensor Networks (WSNs), i.e., networks of tiny smart cameras, to address this problem. We believe that smart cameras have many advantages over classic sensor motes. Nevertheless, we argue that a specific software in- frastructure is needed to fully exploit them. We identify the three main services such software must provide, i.e., monitoring, remote configura- tion, and remote code-update, and we propose a modular architecture for them. We discuss our implementation of such architecture, called ScanTraffic, and we test its effectiveness within an ITS prototype we deployed at the Pisa International Airport. We show how ScanTraffic greatly simplifies the deployment and management of smart cameras col- lecting information about traffic flow and parking lot occupancy. Keywords: intelligent transport systems, visual wireless sensor net- works, smart cameras 1 Introduction Intelligent Transport Systems (ITSs) are nowadays at the focus of public au- thorities and research communities aiming at providing effective solutions for improving citizens lifestyle and safety.
    [Show full text]
  • Secure Routing in Multi-Hop Wireless Networks
    Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Telecommunications Laboratory of Cryptography and Systems Security (CrySyS) Secure Routing in Multi-hop Wireless Networks Ph.D. Dissertation of Gergely Ács Research Supervisor: Levente Buttyán, Ph.D. 2009 Alulírott Ács Gergely kijelentem, hogy ezt a doktori értekezést magam készítettem, és abban csak a megadott forrásokat használtam fel. Minden olyan részt, amelyet szó szerint, vagy azonos tartalomban, de átfogalmazva más forrásból átvettem, egyértelműen, a forrás megadásával megjelöltem. I, the undersigned Gergely Ács hereby declare that this Ph.D. dissertation was made by myself, and I only used the sources given at the end. Every part that was quoted word-for- word, or was taken over with the same content, I noted explicitly by giving the reference of the source. Budapest, 2009. április 8. ................................ Ács Gergely iii Abstract Routing is a fundamental networking function in every communication system, and multi- hop wireless networks are no exceptions. Attacking the routing service, an adversary can easily paralyse the operation of an entire network. Compared to traditional wired networks, such attacks can be performed relatively easily in wireless networks due to the unsupervised access to the wireless medium. The malicious manipulation of some routing messages results in the dissemination of incorrect routing information which can eventually lead to network malfunction. Even more, intermediate nodes can be corrupted, and thus, exhibit arbitrary behaviour. Considering these facts, securing routing protocols is a primary task, however, designing such secure routing protocols is not a straightforward procedure. A widely used method has been so far to identify different types of possible attacks against routing, and to define routing security implicitly as resistance to these attacks.
    [Show full text]
  • Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications
    sensors Review Routing Protocols for Low Power and Lossy Networks in Internet of Things Applications José V. V. Sobral 1,2 , Joel J. P. C. Rodrigues 1,3,4,5,6,*,† , Ricardo A. L. Rabêlo 4 , Jalal Al-Muhtadi 5 and Valery Korotaev 6 1 Instituto de Telecomunicações, Universidade da Beira Interior, 6201-001 Covilhã, Portugal; [email protected] 2 Federal Institute of Maranhão (IFMA), São Luís-MA 65010-030, Brazil 3 National Institute of Telecommunications (Inatel), Santa Rita do Sapucaí-MG 37540-000, Brazil 4 Federal University of Piauí, Teresina-PI 64049-550, Brazil; [email protected] 5 College of Computer and Information Sciences (CCIS), King Saud University, Riyadh 12372, Saudi Arabia; [email protected] 6 ITMO University, St. Petersburg 197101, Russia; [email protected] * Correspondence: [email protected]; Tel.: +55-35-3471-9200 † Current address: Av. João de Camargo, 510-Centro, Santa Rita do Sapucaí-MG 37540-000, Brazil. Received: 23 March 2019; Accepted: 5 May 2019; Published: 9 May 2019 Abstract: The emergence of the Internet of Things (IoT) and its applications has taken the attention of several researchers. In an effort to provide interoperability and IPv6 support for the IoT devices, the Internet Engineering Task Force (IETF) proposed the 6LoWPAN stack. However, the particularities and hardware limitations of networks associated with IoT devices lead to several challenges, mainly for routing protocols. On its stack proposal, IETF standardizes the RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) as the routing protocol for Low-power and Lossy Networks (LLNs). RPL is a tree-based proactive routing protocol that creates acyclic graphs among the nodes to allow data exchange.
    [Show full text]
  • A Secure Routing Algorithm
    TinyTermite: A Secure Routing Algorithm A Thesis Presented for the Master of Science Degree The University of Tennessee at Chattanooga Joshua L. Patterson December 2008 To the Graduate Council: I am submitting a thesis written by Joshua L. Patterson entitled “TinyTermite: A Secure Routing Algorithm”. I have examined the final copy of this thesis and recommend that it be accepted in partial fulfillment of the requirements for the degree of Master of Science with a major in Computer Science. ___________________________________ Dr. Mina Sartipi, Chairperson We have read this thesis and recommend its acceptance: _________________________________ Dr. Billy Harris _________________________________ Dr. Li Yang Accepted for the Graduate Council: ___________________________________ Interim Dean of the Graduate School Dedication I would like to dedicate this master’s thesis and my master’s degree to my parents. Without their support neither would be possible. i Abstract In this thesis, we introduce TinyTermite. TinyTermite is a novel probabilistic routing algorithm that is secure against selective forwarding and replay attacks. We use suspicion pheromone to build a flexible map of possible compromised neighbors. As suspicion builds up and decays for each neighbor, TinyTermite is able to deal with uncertain stimulus and react properly. TinyTermite is fully implemented on TinyOS based Intel Mote 2 platform and the experiments were done to compare its performance with that of the traditional Termite algorithm. The experimental results show that TinyTermite is significantly more secure against replay and sinkhole attacks by lowering the packet loss from 88.5% to 32.9% with 12.7% normal packet loss. The experimental results also demonstrate that the TinyTermite provides high throughput and low latency.
    [Show full text]