Introduction
Related work
Proposed approach
ISC | 3-bits initial security code |
Hc | Cth hop count |
S1c, S2c, S3c | Three bits of ISC at Cth hop |
G1c, G2c, G3c | Generated bits at Cth hop |
CB | Final security code |
N | Total number of initial security bits |
Mj | Active nodes |
Aj | Attacker nodes |
TN | Source node |
RN | Destination node |
Th | Total number of hops |
Evaluation of proposed method at different hops
At hop 1
At hop 2
At hop 3
Hop count (C) |
S
1
|
S
2
|
S
3
|
G
1
|
G
2
|
G
3
|
C
B
|
---|---|---|---|---|---|---|---|
1 | 0 | 0 | 0 | 0 | 0 | 0 | 000000 |
2 | 0 | 0 | 1 | 0 | 0 | 1 | 001001 |
3 | 0 | 1 | 0 | 1 | 0 | 1 | 010101 |
4 | 0 | 1 | 1 | 1 | 0 | 0 | 011100 |
5 | 1 | 0 | 0 | 1 | 1 | 1 | 100111 |
6 | 1 | 0 | 1 | 1 | 1 | 0 | 101110 |
7 | 1 | 1 | 0 | 0 | 1 | 0 | 110010 |
8 | 1 | 1 | 1 | 0 | 1 | 1 | 111011 |
Simulation results
Parameters | Considered values |
---|---|
Time for simulation | 650 s |
Nodes count considered | 2 to 120 |
Maximum hop count | 9 |
Propagation model | Two-ray ground |
Type of link layer | Logical link |
Type of MAC used | 802.11 |
Type of queue | Drop-tail |
Packet size | 512 bytes |
Routing type | LAEERP |
Traffic | Video |
Pause time | 0, 25, 50, 100 ms |
Network area | 1000 m × 1000 m |
Speed of node | 3, 6, 9, 12 m/s |