Evaluate the Types of Attacks in the Routing of Mobile Networks and Provide a New Way to Detect and Prevent Wormhole Attacks in Secure Routing base in SPR Protocol
Mobile case networks are an independent set of mobile nodes that communicate with each other via wireless communications and are a good solution for unpredictable events. These networks also have no specific infrastructure that operates mobile and autonomously and through radio waves which they are in touch with each other. Due to the variable number of nodes in the communication network between them are constantly changing, so the security of these networks is very important. In this article, we study different types of routing protocols, security problems in routing mobile case networks and different types of secure routing protocols along with its advantages and disadvantages, and with changes in SPR protocol, the problem of wormhole attacks using a new combination. We solve by the closed collars technique. In this way, by adding another technique as the status collar technique to the SPR protocol, which is based on the status of each packet based on security features and encryption information, packets exchanged along the way can be tracked and controlled. We also used the Diffie-Hellman algorithm to manage the key and increase the security of the proposed method, and finally we used MATLAB software to implement the proposed algorithm.
- حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران میشود.
- پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانههای چاپی و دیجیتال را به کاربر نمیدهد.