Nt1330 Unit 7 Exercise 1

Words: 884
Pages: 4

2. Incapabilities. The attackers do not issue strong active attacks such as black hole. They can only perform intrusion to a proportion of all nodes. Their computing resources are not unlimited; thus, both symmetric and public/private key cannot be brutally decrypted within a reasonable time period. Therefore, encrypted data are secure to a certain degree when the key is not known to the attackers[7].
IV NETWORK MODELS
We use two different network models, random way point model [7] and group mobility model [18]. With the random way point model as the default setting, we also compare the performance of ALERT in the group mobility model.

Fig.3.GPSR Failure and Hand Rules
4.1 Parameters
We use the following metrics to evaluation the routing
…show more content…
The number of actual participating nodes. These nodes include RFs and relay nodes that actually participate in routing. This metric demonstrates the ability of ALERT’s randomized routing to avoid routing pattern detection [11].
2. The number of random forwarders. This is the number of actual RFs in a S-D routing path. It shows routing anonymity and efficiency [10].
3. The number of remaining nodes in a destination zone. This is the number of original nodes remaining in a destination zone after a time period. A larger number provides higher anonymity protection to a destination and to counter the intersection attack. We measure this metric over time to show effectiveness on the destination anonymity protection [12].
4. The number of hops per packet. This is measured as the accumulated routing hop counts divided by the number of packets sent, which shows the efficiency of routing algorithms.
5. Latency per packet. This is the average time elapsed after a packet is sent and before it is received. It includes the time cost for routing and cryptography. This metric reflects the latency and efficiency of routing algorithms.
6. Delivery rate. This is measured by the fraction of packets that are successfully delivered to a destination. It shows the robustness of routing algorithms to adapt to mobile network