Adhoc network is self-organized,no-centered and has dynamic-topology.It is widely used in civilian,military,disaster relief and other discount wedding dresses fields.Most of the security routing protocols use cryptography to provide routing message confidentiality,integrity and anti-whether.The cryptography provides routing lace wedding dresses protocol blog wedding dresses 2010security,but brings high computational complexity,large energy Consumption and other issues with it.How to reduce the computation and energy consumption of secure routing protocl cheap evening dresses become the research focus of Adhoc network.In this thesis,Features and custom made prom dresses categories of Adhoc network routing protocol are introduced at first.Its security problems and appropriate custom made prom dresses safety measures are analysised.Several types of security routing protocols are discussed.On this basis, the flat iron shop for us protocol is discussed for the large public-key computation it has.Finally ISAODV protocol is proposed.ISAODV protocol has the following characteristics:(1) Signature verifications for discount wedding dresses the redundant reverse-path are avoided,so computation of the protocol is reduced.(2)Trust chain in the protocol is used,so the verification for the source-node before custom made prom dresses intermediate node wedding gowns dresses send RREP is avoided.(3)Temporary routing table and trust chain routing table are established to store the path of different types. It help to ensure the security of the protocol.At last,simulation tests of ISAODV protocol and SAODV protocol are made. The results show that,energy consumption and network latency in ISAODV protocol are lower than in SAODV protocol.
http://www.witchnet.ca
http://www.6abib.com/ask
http://www.freeadvertisingzone.com