IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Investigating the Performance of the TSS Scheme in Noisy MANETs

Investigating the Performance of the TSS Scheme in Noisy MANETs
View Sample PDF
Author(s): Hussein Al-Bahadili (Petra University, Jordan), Shakir M. Hussain (Petra University, Jordan), Ghassan F. Issa (Petra University, Jordan)and Khaled El-Zayyat (Al-Ahliyya Amman University, Jordan)
Copyright: 2013
Pages: 21
Source title: IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-2919-6.ch047

Purchase

View Investigating the Performance of the TSS Scheme in Noisy MANETs on the publisher's website for pricing and purchasing information.

Abstract

A Mobile Ad Hoc Network (MANET) suffers from high packet-loss due to various transmission impairments, such as: wireless signal attenuation, free space loss, thermal noise, atmospheric absorption, multipath effect, and refraction. All of these impairments are represented by a generic name, noise, and therefore such a network is referred to as a noisy network. For modeling and simulation purposes, the noisy environment is described by introducing a probability function, namely, the probability of reception (pc), which is defined as the probability that transmitted data is successfully delivered to its destination despite the presence of noise. This chapter describes the implementation and investigates the performance of the Threshold Secret Sharing (TSS) node authentication scheme in noisy MANETs. A number of simulations are performed using the MANET Simulator (MANSim) to estimate the authentication success ratio for various threshold secret shares, number of nodes, node speeds, and noise-levels. Simulation results demonstrate that, for a certain threshold secret share, the presence of noise inflicts a significant reduction in the authentication success ratio, while node mobility inflicts no or an insignificant effect. The outcomes of these simulations are important to facilitate efficient network management.

Related Content

Jeff Mangers, Christof Oberhausen, Meysam Minoufekr, Peter Plapper. © 2020. 26 pages.
Sylvain Maechler, Jean-Christophe Graz. © 2020. 27 pages.
Sabrina Petersohn, Sophie Biesenbender, Christoph Thiedig. © 2020. 41 pages.
Jonas Lundsten, Jesper Mayntz Paasch. © 2020. 21 pages.
Justus Alexander Baron. © 2020. 31 pages.
Vasileios Mavroeidis, Petros E. Maravelakis, Katarzyna Tarnawska. © 2020. 19 pages.
Hiam Serhan, Doudja Saïdi-Kabeche. © 2020. 30 pages.
Body Bottom