scispace - formally typeset
Search or ask a question
Author

M.Y. Alsaadi

Bio: M.Y. Alsaadi is an academic researcher from University of Puerto Rico at Mayagüez. The author has contributed to research in topics: Routing protocol & Hazy Sighted Link State Routing Protocol. The author has an hindex of 1, co-authored 1 publications receiving 13 citations.

Papers
More filters
Proceedings ArticleDOI
16 Apr 2007
TL;DR: This paper improves the security of routing for the existing D SR protocol by enhancing the concept of trust value, the selection of a secure route will be based on these trust values, and ns-2 simulations are performed to evaluate the impact of applying trust value based route selection to the DSR protocol.
Abstract: Mobile ad hoc network (MANET) is a special type of mobile wireless network where a collection of mobile devices form a temporary network without any aid of an established infrastructure. Security issues put special challenges in MANET routing protocol design. This paper focuses on the performance study for security of a MANET routing protocol, and particularly on the improvement of the security for dynamic source routing protocol (DSR). We improve the security of routing for the existing DSR protocol by enhancing the concept of trust value, the selection of a secure route will be based on these trust values, ns-2 simulations are performed to evaluate the impact of applying trust value based route selection to the DSR protocol

13 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper simulates the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA routing protocols in MANET, to analyze the performance of above said protocols based on Packet Delivery Ratio, Average End-to-End Delay and Throughput.
Abstract: The primary objective of this research work is to study and investigate the performance measures of Reactive protocols (AODV, TORA) and Proactive protocols (DSDV) routing protocols of MANET using TCP & CBR based traffic models. In this paper we will simulate the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA routing protocols in MANET, to analyze the performance of above said protocols based on Packet Delivery Ratio, Average End-to-End Delay and Throughput. We will investigate the effect of change in number of nodes on MANET routing protocols. Here, we will analyze and compare the performance of MANET routing protocols based on both CBR and TCP based traffic patterns. We have used the NS-2 simulator for performing various simulations and used awk scripts for analyzing the results.

48 citations

Journal ArticleDOI
TL;DR: A new mechanism is proposed that improves the performance of routing protocol against the malicious attacks and proposes observing nodes behavior such as nodes’ mobility, and avoiding communication through these nodes which may lead to more secure routing.
Abstract: The increased popularity and usage of wireless technologies has opened the doors for new emerging applications in the domain of networking. One emerging and promising areas is the domain of Mobile Ad Hoc Networks (MANETs). A mobile ad hoc network is a collection of wireless mobile nodes that form a dynamic network without the need for infrastructure or centralized points. The dynamic nature of ad hoc networks presents many security challenges. Secure routing is a promising area for achieving better security for the network by protecting the routing protocols against malicious attacks. Several secure routing protocols have been proposed in the literatures that were successful in avoiding and preventing some types of security attacks in MANETs. However, MANETs are still vulnerable to other types of attacks. Hence, there is a need for introducing an efficient mechanism to detect malicious nodes. In this paper, a new mechanism is proposed that improves the performance of routing protocol against the malicious attacks. Since a malicious node behaves in abnormal ways, this mechanism proposes observing nodes behavior such as nodes’ mobility, and avoiding communication through these nodes which may lead to more secure routing.

17 citations

01 Jan 2011
TL;DR: This work analyzed the performance of AODV, DSR and DSDV protocols for TCP traffic pattern on the basis of Packet Delivery Ratio, Throughput and Jitter.
Abstract: The primary objective of this research work is to study and review the behaviour of AODV, DSR and DSDV routing protocols of MANET. In this paper, we will first discuss the various MANET routing protocols and various studies done on the performance evaluation of mobile Ad-hoc network (MANET). Here, we will study the performance of MANET routing protocols based on TCP traffic patterns. We also analyzed the performance of AODV, DSR and DSDV protocols for TCP traffic pattern on the basis of Packet Delivery Ratio, Throughput and Jitter.

16 citations

Proceedings ArticleDOI
18 Mar 2016
TL;DR: The complete study observes that, security threats not only capture the packets but also degrade network performance, so work considers wormhole attack as study target and will derive mechanism to identify and prevent mobile networks from security threat.
Abstract: Wireless networks are playing important role for development and ease of use of human society. It also gets a lot of attention from research community towards the betterment of applications. A wide range of applications make it very popular and backbone of technology system i.e. GSM, Bluetooth, Wi-Fi etc. In order to categorization of applications, this network gives a unique range for monitoring and surveillance. MANETs may be ad-hoc is fixed natured use to deploy into remote areas for sensing and processing desire information. Due to distributed and open natured of wireless networks, it is vulnerable and prone for attacked to intercept and hijack network communication. Its deployment in remote areas requires more concern of security issues. Open natured communication be a magnet for attacker to intercept and catch the sensed information. Numerous security threats can adversely affect its functioning & degrade network performance. The problem becomes more critical when it deploy for defense mission. Arbitrary network failure or node failure is the natural phenomena and may vary as per real life deployment, but intentional failure or compromising network may lead to leak the information. A various security threats like Worm-hole attack, Black-hole Attack, Gray-hole attack, Sybil Attack etc. are used for packet dropping, capturing and degrading network performance. Security in mobile networks is a challenging task. Furthermore, low profile resources and security overhead create cumbersome situation for detection and prevention mechanism. The complete study observes that, security threats not only capture the packets but also degrade network performance. To overcome vulnerability problems, work considers wormhole attack as study target and will derive mechanism to identify and prevent mobile networks from security threat. A wormhole attack is very popular and applies on network layer by targeting vulnerabilities of routing protocols. The complete works consider Ad-hoc On Demand Routing protocol and identify several vulnerabilities.

14 citations

Proceedings ArticleDOI
14 Dec 2009
TL;DR: Simulation results show that the improved routing protocol using CLB-DSR can effectively balance network load, improve the network throughput and reduce the end-to-end delay, the rate of data dropped.
Abstract: In ad hoc networks, when the load is heavy, the performance of on-demand routing protocols, such as DSR protocol, will suffer large degradation. For instance, the absence of balanced distribution of network flow among nodes in the whole network is highly prone to producing heavy-load key nodes. This results in fast energy consumption of these key nodes, and finally decreasing the survival time of the network caused by their premature failures. To address this problem, a novel algorithm called Cross-layer based Load Balancing algorithm for DSR (CLB-DSR) is proposed. In CLB-DSR, the cross-layer strategy is adopted to exchange the information between data link layer and network layer. Simulation results show that the improved routing protocol using CLB-DSR can effectively balance network load, improve the network throughput and reduce the end-to-end delay, the rate of data dropped.

11 citations