0% found this document useful (0 votes)
91 views2 pages

Cryptographic Versus Trust-Based Method For Manet Routing Security - Abstract

This document compares two MANET routing protocols, SAODV and TAODV, that take different approaches to securing routing information - cryptographic methods for SAODV versus trust-based methods for TAODV. It analyzes the performance of each protocol on actual hardware to provide insights into the tradeoff between security strength and vulnerability to denial of service attacks. The findings could help guide design decisions for future routing protocols seeking the right balance in this tradeoff.

Uploaded by

Shreyansh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views2 pages

Cryptographic Versus Trust-Based Method For Manet Routing Security - Abstract

This document compares two MANET routing protocols, SAODV and TAODV, that take different approaches to securing routing information - cryptographic methods for SAODV versus trust-based methods for TAODV. It analyzes the performance of each protocol on actual hardware to provide insights into the tradeoff between security strength and vulnerability to denial of service attacks. The findings could help guide design decisions for future routing protocols seeking the right balance in this tradeoff.

Uploaded by

Shreyansh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Cryptographic Versus Trust-based Metho ds for MANET Routing Security

ABSTRACT Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a xed infrastructure. Early routing protocols for MANETs failed to take security issues into account. Subsequent proposals used strong cryptographic methods to secure the routing information. In the process, however, these protocols created new avenues for denial of service (DoS). Consequently, the trade-o between security strength and DoS vulnerability has emerged as an area requiring further investigation. It is believed that di erent trust methods can be used to develop protocols at various levels in this tradeo. To gain a handle on this exchange, real world testing that evaluates the cost of existing proposals is necessary. Without this, future protocol design is mere speculation. In this paper, we give the rst comparison of SAODV and TAODV, two MANET routing protocols, which address routing security through cryptographic and trust-based means respectively. We provide performance comparisons on actual resource-limited hardware. Finally, we discuss design decisions for future routing protocols. K e y words: mobile, ad-hoc, security, routing, cryptography, trust-based, performance 1
System Requirements Specification:
Hardware Requirements Processor PENTIUM IV

RAM Hard Disk Cache Memory Virtual Memory Display Card Mouse Keyboard

128 MB 40 GB 11,011,968 Bytes 32 MB Super Video Graphics Adapter (SVGA) Logitech Serial Mouse Standard 104 Enhanced Keyboard

Software Requirements CORE JAVA SWINGS NETWORKING

You might also like