scispace - formally typeset
Search or ask a question

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is intended for use by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines unicast routes to destinations within the ad hoc network. It uses destination sequence numbers to ensure loop freedom at all times (even in the face of anomalous delivery of routing control messages), avoiding problems (such as "counting to infinity") associated with classical distance vector protocols.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: The genetic algorithm-based energy-efficient clustering and routing approach GECR is presented, which achieved the best load balancing with the lowest variances in the loads on the cluster heads under different scenarios and was the most energy- efficient.

74 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...In flat routing protocols [48-50], these nodes transmit data directly or through multiple hops to the sink node....

    [...]

Proceedings ArticleDOI
23 Jan 2006
TL;DR: A new position-based routing protocol is proposed which keeps routing nodes anonymous, thereby preventing possible traffic analysis and ensures the anonymity of both route and nodes and the robustness against the target-oriented attack and several others.
Abstract: Due to the infrastructure-less, dynamic and broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are susceptible to malicious traffic analysis. After traffic analysis, an attacker determines a target node and conducts an intensive attack against it, called target-oriented attack. The traffic analysis and the target-oriented attacks are known as quite severe problems in MANETs, including position-based routing protocols, with respect to the degradation of both throughput and security of the routing. Also position information of routing nodes is very sensitive data in MANETs where even nodes not knowing either other establish a network temporarily. Therefore we propose a new position-based routing protocol which keeps routing nodes anonymous, thereby preventing possible traffic analysis. To this end, a time variant temporary identifier temp ID is computed from time and position of a node and used for keeping the node anonymous. Only the position of a destination node is required for the route discovery, and temp ID is used for establishing the route for sending data: a receiver hand shake scheme is designed for determining the next hop on-demand with use of the temp ID. We evaluate the level of anonymity and performance of our scheme. The analysis shows that the proposed scheme ensures the anonymity of both route and nodes and the robustness against the target-oriented attack and several others. Also our scheme is applicable to networks with any density of nodes.

74 citations


Cites background from "Ad hoc On-Demand Distance Vector (A..."

  • ...Adversaries can still carry out traffic analysis based on the bare network-layer and/or MAC addresses, such as AODV [6] and DSR [7] and the de facto MAC protocol IEEE 802.11....

    [...]

  • ...Proceedings of the 2005 Symposium on Applications and the Internet (SAINT’06) 0-7695-2262-9/06 $20.00 © 2006 IEEE [6] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc OnDemand Distance Vector (AODV) Routing,” RFC 3561, July 2003....

    [...]

  • ...Adversaries can still carry out traffic analysis based on the bare network-layer and/or MAC addresses, such as AODV [6] and DSR [7] and the de facto MAC protocol IEEE 802....

    [...]

  • ...Topology-based MANET protocols such as AODV and DSR, which are under the consideration for standardization by the IETF MANET Working Group, are both vulnerable to a number of attacks including impersonation, modification, and fabrication [10]....

    [...]

Journal ArticleDOI
TL;DR: This paper gives the first comparison of SAODV and TAODV, two MANET routing protocols, which address routing security through cryptographic and trust-based means respectively, and provides performance comparisons on actual resource-limited hardware.

74 citations


Cites methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...Initial MANET routing protocols, such as AODV [18], were not designed to withstand malicious nodes within the network or outside attackers nearby with malicious intent....

    [...]

  • ...The earliest protocols such as DSDV [19], DSR [11], and AODV [18] focused on problems that mobility presented to the accurate determination of routing information....

    [...]

  • ...Due to space considerations, the reader is referred to [18,25,15] for descriptions of the AODV, SAODV, and TAODV protocols respectively...

    [...]

Journal ArticleDOI
TL;DR: This work proposes UPASS, the first known secure authentication and billing architecture for large-scale WMNs, which features a novel user-broker-operator trust model built upon the conventional certificate-based cryptography and the emerging ID- based cryptography.
Abstract: Wireless mesh networks (WMNs) are gaining growing interest as a promising technology for ubiquitous high-speed network access. While much effort has been made to address issues at physical, data link, and network layers, little attention has been paid to the security aspect central to the realistic deployment of WMNs. We propose UPASS, the first known secure authentication and billing architecture for large-scale WMNs. UPASS features a novel user-broker-operator trust model built upon the conventional certificate-based cryptography and the emerging ID-based cryptography. Based on the trust model, each user is furnished with a universal pass whereby to realize seamless roaming across WMN domains and get ubiquitous network access. In UPASS, the incontestable billing of mobile users is fulfilled through a lightweight realtime micropayment protocol built on the combination of digital signature and one-way hash-chain techniques. Compared to conventional solutions relying on a home-foreign-domain concept, UPASS eliminates the need for establishing bilateral roaming agreements and having realtime interactions between potentially numerous WMN operators. Our UPASS is shown to be secure and lightweight, and thus can be a practical and effective solution for future large-scale WMNs.

74 citations

Journal ArticleDOI
TL;DR: The proposed protocol introduces for the first time in satellite systems the concept of on-demand routing, however, its implementation is tailored to the requirements imposed by the characteristics of the topology of LEO satellite systems.

73 citations


Cites background or methods from "Ad hoc On-Demand Distance Vector (A..."

  • ...The path discovery process is independently invoked for each communication demand and aims at discovering the shortest path for an origin/destination pair....

    [...]

  • ...Keywords: Routing; On-demand; Satellite; Low earth orbit...

    [...]

  • ...That protocol makes use of a cost metric that takes into account both propagation and queueing delay measure- ments and combines them with appropriate weighting factors....

    [...]

References
More filters
01 Mar 1997
TL;DR: This document defines these words as they should be interpreted in IETF documents as well as providing guidelines for authors to incorporate this phrase near the beginning of their document.
Abstract: In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. Authors who follow these guidelines should incorporate this phrase near the beginning of their document:

3,501 citations

12 Nov 2001
TL;DR: In this article, a logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Abstract: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument. The radiation detectors are gated differently from each other to provide an indication of formation porosity which is substantially independent of the formation salinity. In the preferred embodiment, the electrical signals indicative of radiation detected by the long-spaced detector are gated for almost the entire interval between neutron pulses and the short-spaced signals are gated for a significantly smaller time interval which commences soon after the termination of a given neutron burst. The signals from the two detectors are combined in a ratio circuit for determination of porosity.

574 citations

01 Jan 1998
TL;DR: In this article, the authors discuss issues that should be considered in formulating a policy for assigning values to a name space and provide guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA). In order for the IANA to manage a given name space prudently, it needs guidelines describing the conditions under which new values can be assigned. If the IANA is expected to play a role in the management of a name space, the IANA must be given clear and concise instructions describing that role. This document discusses issues that should be considered in formulating a policy for assigning values to a name space and provides guidelines to document authors on the specific text that must be included in documents that place demands on the IANA.

536 citations

01 Oct 1998
TL;DR: Many protocols make use of identifiers consisting of constants and other well-known values that must be administered by a central authority to insure that such quantities have consistent values and interpretations in different implementations.
Abstract: Many protocols make use of identifiers consisting of constants and other well-known values. Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority. For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).

334 citations

01 Jun 2004
TL;DR: This document defines terms for mobility related terminology out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks.
Abstract: There is a need for common definitions of terminology in the work to be done around IP mobility. This document defines terms for mobility related terminology. The document originated out of work done in the Seamoby Working Group but has broader applicability for terminology used in IETF-wide discourse on technology for mobility and IP networks. Other working groups dealing with mobility may want to take advantage of this terminology. This memo provides information for the Internet community.

207 citations


"Ad hoc On-Demand Distance Vector (A..." refers methods in this paper

  • ...This section defines other terminology used with AODV that is not already defined in [3]....

    [...]