How to implement leach then aodv on a network?

I want to implement Leach protocol on a network of 100 nodes then apply AODV protocol for path building. After that I want to detect the node which increases delay and isolate with Delphi technique. Can someone help me out please?

12 Comments

Just for clarity, please tell me if both are necessary in a network? Or can it be made without LEACH? If so I can skip LEACH protocol implementation
AODV makes no reference to Leach, so it does not require Leach.
Can a network be simulated with 100 nodes to demonstrate the detection and isolation of a malicious node increasing the delay in the network, completely based on AODV?
No, AODV has no built-in security measures for detecting or isolating malicious nodes.
Section 11 of the RFC recommends using IPSec to do encrypted transmissions, but in the case that authentication fails, all that happens is that the detected spoof gets dropped: no active isolation takes place.
In my experience, IPSec is more expensive than most people creating the networks are likely to want to implement in situation where energy costs are to be kept minimal.
Then should I just proceed with LEACH for malicious node detection and isolation? By the way I want to apply delphi technique to isolate the node so can I proceed with AODV only?
LEACH is not suitable for detecting security problems either.
I am not familiar with delphi technique.
Sir I want to deploy a network then cluster it and then establish a path between source and sink. Then i have to add a malicious node and detect it and isolate it using multipath routing. Can you please suggest how should I proceed?
I would recommend proceeding by going over to http://scholar.google.com and searching for research papers on the topic. Once you have decided upon a particular approach, we can help you with errors you are encountering, or help propose routines to do specific tasks like configuration of your Software Defined Radio. But we are not going to tell you how to implement something as general as you are asking for.
I am done till leach now all I want to do is localize nodes, add malicious node and detect it and isolate it with the help of multipath routing and delphi technique. Dont know where to begin. Please help if anyone can.
What methods were recommended in the research papers you found on the topic?
In this context, what do you mean by "localize nodes" ?
I also have no specific idea about that, all I know is I have to apply a technique to localize nodes, which will identify the node in the network increasing delay.
Localization is the process of using code that has been Internationalized to convert the representation of data structures into the language and numbering system of the user running the code.
For example, I happen to use Canadian English, which uses the common English names and abbreviations of the months ('Jan', 'Feb', 'Mar' and so on), but which avoids the USA practice of writing dates as MM/DD/YYYY, preferring YYYY-MM-DD or YYYYMMDD . Localization would include the process of converting dates from whatever internal format they were in to display to me in YYYY-MM-DD format -- with a recognition that someone in the USA might want to see the same date as MM/DD/YYYY .
Localization offers little that is useful for the detection of malicious nodes.

Sign in to comment.

Answers (0)

Categories

Asked:

on 2 Jun 2018

Commented:

on 8 Jul 2018

Community Treasure Hunt

Find the treasures in MATLAB Central and discover how the community can help you!

Start Hunting!