Abstract
Ad hoc network is a special network with centerless and dynamic topology. Due to the free mobility of the nodes, routing security has been a bottleneck problem that plagues its development. Therefore, a multi-path QoS (quality of service) routing security algorithm based on blockchain by improving the traditional AODV (ad hoc on-demand distance vector) protocol (AODV-MQS) is proposed. Firstly, a chain of nodes is established in the network and the states of all nodes by making the intermediate nodes on the chain are saved. Secondly, the smart contract in the blockchain is set to filter out the nodes that meet the QoS constraints. Finally, two largest unrelated communication paths are found in the blockchain network through smart contract, one of which is the main path and the other is the standby path. Simulation experiments show that the performance of the proposed algorithm is better than other algorithms, especially in an unsafe environment.
Highlights
In Ad Hoc networks, because the nodes are exposure to the outside, some problems, for example, the nodes are damaged and the batteries are exhausted and so on, are faced by them [1, 2]
There have been many attack methods and defense schemes to deal with the problems of protocol vulnerabilities and routing security of Ad Hoc networks [5,6,7]
IEEE 802.11 and constant bit rate (CBR) data stream are adopted in the MAC layer
Summary
In Ad Hoc networks, because the nodes are exposure to the outside, some problems, for example, the nodes are damaged and the batteries are exhausted and so on, are faced by them [1, 2]. The routing security issues of mobile Ad Hoc networks need to be resolved urgently. There have been many attack methods and defense schemes to deal with the problems of protocol vulnerabilities and routing security of Ad Hoc networks [5,6,7]. A node as an individual may be subjected to malicious attacks, the attack points are not limited to a certain protocol layer, and they can harm some layers of the protocol stack at the same time [8, 9]. From the perspective of attack methods, the attacks can be classified into four categories: interception, tampering, interruption and forgery [12]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: EURASIP Journal on Wireless Communications and Networking
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.