Way to minimize the time bypass compromised nodes in mobile networks

Main Article Content

Y. A. Kulakov
A. V. Kogan

Abstract

The paper proposes a method for providing the specified parameters QoS- reconfiguration in case of a forced route. Method of forming alternate routes as close as possible to the main routes of transmission of information. An algorithm bypass nodes compromised or excluded from the route, with minimal end delay transmission of information.

References 6, figures 5.

Article Details

How to Cite
Kulakov, Y. A., & Kogan, A. V. (2014). Way to minimize the time bypass compromised nodes in mobile networks. Electronics and Communications, 19(2), 116–122. https://doi.org/10.20535/2312-1807.2014.19.2.142268
Section
Systems of telecommunication, communication and information protection

References

As'ad Mahmoud As'ad Alnaser, Kulakov Y.O. (2013), “Reliable Multipath Secure Routing In Mobile Computer Networks. Computer Engineering and Intelligent Systems,ISSN 2222-1719 (Paper)”. ISSN 2222-2863 (Online). Vol.4, No.2, pp. 8-16.

As'ad Mahmoud As'ad Alnaser, Kulakov Y.O. (2012), “Multipath Routing in Wireless Networks”. Contemporary Engineering Sciences. Vol. 5, No. 6, Pp. 251- 264.

Kuo C. F., Pang A.-C., Chan S.-K. (2009), “Dynamic routing with security considerations”. IEEE transactions on parallel and distributed systems. Vol.20, No. 1, Pp. 48-58.

Lee P. P. C., Misra V., Rubenstein D. (2007), “Distributed algorithms for secure multipath routing in attack-resistant networks”. IEEE/ACM transactions on network. Vol.15, No.6, Pp. 1490-1501.

Lou W., Liu W., Zhang Y., Fang Y. (2009), “SPREAD: Improving network security by multipath routing in mobile ad hoc networks”. Wireless Networks. Vol. 15, No. 3, Pp. 279-294.

Yu M., Zhou M.C., Su W. (2009), “A secure routing protocol against byzantine attacks for MANETs in adversarial environments”. IEEE transactions on vehicular technology. Vol. 58, No. 1, Pp. 449-460.