How to implement leach then aodv on a network?
Show older comments
I want to implement Leach protocol on a network of 100 nodes then apply AODV protocol for path building. After that I want to detect the node which increases delay and isolate with Delphi technique. Can someone help me out please?
12 Comments
DARPAN ANEJA
on 2 Jun 2018
Walter Roberson
on 2 Jun 2018
AODV makes no reference to Leach, so it does not require Leach.
DARPAN ANEJA
on 3 Jun 2018
Walter Roberson
on 3 Jun 2018
No, AODV has no built-in security measures for detecting or isolating malicious nodes.
Section 11 of the RFC recommends using IPSec to do encrypted transmissions, but in the case that authentication fails, all that happens is that the detected spoof gets dropped: no active isolation takes place.
In my experience, IPSec is more expensive than most people creating the networks are likely to want to implement in situation where energy costs are to be kept minimal.
DARPAN ANEJA
on 3 Jun 2018
Walter Roberson
on 3 Jun 2018
LEACH is not suitable for detecting security problems either.
I am not familiar with delphi technique.
DARPAN ANEJA
on 4 Jun 2018
Walter Roberson
on 4 Jun 2018
I would recommend proceeding by going over to http://scholar.google.com and searching for research papers on the topic. Once you have decided upon a particular approach, we can help you with errors you are encountering, or help propose routines to do specific tasks like configuration of your Software Defined Radio. But we are not going to tell you how to implement something as general as you are asking for.
DARPAN ANEJA
on 7 Jul 2018
Edited: DARPAN ANEJA
on 7 Jul 2018
Walter Roberson
on 7 Jul 2018
What methods were recommended in the research papers you found on the topic?
In this context, what do you mean by "localize nodes" ?
DARPAN ANEJA
on 8 Jul 2018
Walter Roberson
on 8 Jul 2018
Localization is the process of using code that has been Internationalized to convert the representation of data structures into the language and numbering system of the user running the code.
For example, I happen to use Canadian English, which uses the common English names and abbreviations of the months ('Jan', 'Feb', 'Mar' and so on), but which avoids the USA practice of writing dates as MM/DD/YYYY, preferring YYYY-MM-DD or YYYYMMDD . Localization would include the process of converting dates from whatever internal format they were in to display to me in YYYY-MM-DD format -- with a recognition that someone in the USA might want to see the same date as MM/DD/YYYY .
Localization offers little that is useful for the detection of malicious nodes.
Answers (0)
Categories
Find more on Operating on Diagonal Matrices in Help Center and File Exchange
Community Treasure Hunt
Find the treasures in MATLAB Central and discover how the community can help you!
Start Hunting!