CFP last date
20 January 2025
Reseach Article

Study and Performance Comparison of AODV and USOR

by Yogesh Raju Patil, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 7
Year of Publication: 2016
Authors: Yogesh Raju Patil, B. M. Patil
10.5120/ijca2016910454

Yogesh Raju Patil, B. M. Patil . Study and Performance Comparison of AODV and USOR. International Journal of Computer Applications. 144, 7 ( Jun 2016), 25-27. DOI=10.5120/ijca2016910454

@article{ 10.5120/ijca2016910454,
author = { Yogesh Raju Patil, B. M. Patil },
title = { Study and Performance Comparison of AODV and USOR },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 7 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume144/number7/25192-2016910454/ },
doi = { 10.5120/ijca2016910454 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:47:00.789603+05:30
%A Yogesh Raju Patil
%A B. M. Patil
%T Study and Performance Comparison of AODV and USOR
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 7
%P 25-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Privacy protection is important for some ad hoc networks in order to achieve privacy preserving routing. In this paper we emphasize and do comparison of two schemes Unobservable Secure On-Demand Routing Protocol(USOR) and AODV to provide and preserve privacy in adhoc networks. USOR is an unobservable, secure routing scheme which provides unlinkability and content unobservability for all the different type of packets. For this it uses a combination of group signature and id based encryption. USOR protects user privacy against both inside and outside attackers by defining stronger privacy requirements. After analysis it is found that the USOR results are improved as compared to AODV.

References
  1. A.Pfitzmann and M. Hansen, “Anonymity, unobservability, and pseudonymity: a consolidated proposal for terminology,” draft, July 2000.
  2. S. Capkun, L. Buttyan, and J. Hubaux, “Self-organized public-key management for mobile ad hoc networks,” IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52–64, Jan.-Mar. 2003.
  3. J. Kong and X. Hong, “ANODR: aonymous on demand routing with untraceable routes for mobile ad-hoc networks,” in Proc. ACM MOBIHOC’ 03, pp. 291–302.
  4. B. Zhu, Z. Wan, F. Bao, R. H. Deng, and M. KankanHalli, “Anonymous secure routing in mobile ad-hoc networks,” in Proc. 2004 IEEE Conference on Local Computer Networks, pp. 102–108.
  5. S. Seys and B. Preneel, “ARM: anonymous routing protocol for mobile ad hoc networks,” in Proc. 2006 IEEE International Conference on Advanced Information Networking and Applications, pp. 133–137.
  6. L. Song, L. Korba, and G. Yee, “AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks,” in Proc. 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 33– 42.
  7. Y. Dong, T. W. Chim, V. O. K. Li, S.-M. Yiu, and C. K. Hui, “ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks,” Ad Hoc Networks, vol. 7, no. 8, pp. 1536–1550, 2009.
  8. Zhiguo Wan, Kui Ren, and Ming Gu,” USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks”, IEEE transactions on wireless communications, vol. 11, no. 5, may 2012
  9. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks,” in Proc. 2004 IEEE LCN, pp. 618–624.
  10. D. Sy, R. Chen, and L. Bao, “ODAR: on-demand anonymous routing in ad hoc networks,” in 2006 IEEE Conference on Mobile Ad-hoc and Sensor Systems
Index Terms

Computer Science
Information Sciences

Keywords

Anonymity Security Privacy USOR and AODV.