• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Information Technology Journal
  2. Vol 9 (3), 2010
  3. 506-511
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Information Technology Journal

Year: 2010 | Volume: 9 | Issue: 3 | Page No.: 506-511
DOI: 10.3923/itj.2010.506.511

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 56

Authors


Du Jun

Country: China

Li Wei-Hua

Country: China

Keywords


  • ant colony algorithm
  • Multi-hop wireless network
  • routing protocol
  • security
Research Article

A Security Routing Optimization Scheme for Multi-hop Wireless Networks

Du Jun and Li Wei-Hua
Selfish nodes and malicious nodes in large-scale ad hoc networks lead to poor performance and even paralyze the network. How to dismiss these nodes from routing table is important to improve the network security. In this study, a security aware routing optimization algorithm named SARO is proposed to achieve this. The SARO is an improvement to ant optimization. It utilizes reputations from a reputation system to derive the pheromone trail refresh process and visible functions. Abnormal nodes are discarded from routing tables and packets are routed along paths with least abnormal nodes. The SARO is a security enhancement to routing protocols, which can both improve security of network and enhance the network performance.
PDF Fulltext XML References Citation

How to cite this article

Du Jun and Li Wei-Hua, 2010. A Security Routing Optimization Scheme for Multi-hop Wireless Networks. Information Technology Journal, 9: 506-511.

DOI: 10.3923/itj.2010.506.511

URL: https://scialert.net/abstract/?doi=itj.2010.506.511

Related Articles

Research on the Repeater Optimization Design in the Wireless Senor Networks Based on Voronoi Algorithm
UC Secure Network Coding Against Pollution Attacks
Crossover Router Based Handoff Scheme for Path Reservation in Hierarchical Mobile Network
Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved