3 SIMULATION SCENARIO AND
RESULTS
3.1 Simulation Scenario
We consider simulating, as mentioned above, the
authentication mechanism of adjacent nodes. The
proposed authentication mechanism needs
cooperation and coordination scenarios in ad hoc
mobile environments so that isolated nodes should
not be left so. We consider authenticated nodes as
the nodes that have been recognized in the network
by their neighborhood relationships. Isolated nodes
are the nodes that have not been in communication
with other nodes. Unapproved nodes are defined as
nodes which are not authenticated by any node
within its transmission range even though there are
nodes within its transmission range. The number of
isolated nodes and the number of unapproved nodes
are indeed important parameters to evaluate the
performance of the neighbor authentication
mechanism.
We randomly distributed NN nodes within
100x100 rectangular area where we set NN=100,
200, 300, 400, and 500, and the transmission range
r= 1, 2, 3, …, 9. We assume that each node moves
according to the random waypoint model (Bettstetter,
2004) within a mobility range M for each movement,
where M= 1, 2, 3, …, 9. We measure the number of
authenticated nodes, the number of isolated nodes,
and the number of unapproved nodes.
3.2 Simulation Results
The percentage of authenticated nodes among NN
nodes for various values of mobility range when r=9
is shown in Fig. 3. As NN increases, the numbers of
authenticated nodes increase. When mobility range
is much higher, the percentage of authenticated
nodes is very low. It is very understandable that if
the nodes are very mobile, the communication
environment is not stable unless the transmission
range is set proportionally to cope with the high
mobility rate. This is shown through the slice
authentication distribution improvement when r=9.
The percentage of isolated nodes for various
values of mobility range is shown in Fig. 4. As NN
increases, the numbers of isolated nodes decrease
when mobility range is much smaller. In Figs. 5 and
6, we notice that from a transmission range from 1 to
9 the number of isolated nodes tends to decrease for
various mobility ranges varying between 1 and 9.
The percentage of isolated nodes decreases as NN
increases. The bigger the number of nodes is and the
larger the transmission range is, the more common
adjacent nodes are kept in the network where a node
is not fixed in one position.
The numbers of unapproved nodes for various
values of mobility range are shown in Figs.7 and 8.
As r increases, the number of unapproved nodes
increases until the neighbor authentication
mechanism works. In Fig.7, as NN=100, the number
of unapproved nodes increases especially for a
higher mobility range (from 2 and above) because
the nodes can cover more transmission areas so that
chances of authentication occurs but failed. However
when the number of nodes is much higher as shown
in Fig. 8, where NN=500, the number of unapproved
nodes decreases for increasing transmission ranges.
This is because of the authentication mechanism the
number of unapproved nodes decreases. In Fig. 8, all
curves seem to have the similar tendency.
In Fig. 9, isolated, authenticated and unapproved
nodes for the cases of one-step neighbor and two-
step neighbor are depicted in the four sections where
LEFTUP shows position of nodes, RIGHTUP shows
one-step neighbor case, RIGHTDOWN shows two-
step neighbor case, and LEFTDOWN shows
augmented relations because of increased
authentication process where NN=500, r=10 and
M=9. There are 358 authenticated nodes. In the one-
step neighbor case, 101 authenticated nodes increase
because of enlarging to one-step neighbor. There are
still 41 unapproved nodes.
Our algorithm checks for and confirms the idea
that a node is authenticated by its neighbor. Our
graphs show two main parameters in this simulation
that influence the authentication process: node
mobility and transmission range. The higher the
transmission range is, the better the percentage of
authenticated nodes is. When node density increases,
and the transmission range increases, the trust
increases. The parameters in form of authentication
percentage and isolated nodes ratio indicate the
performance measures.
So far we have been simulating the first aspect of
our algorithm. Using the neighborhood table, if a
node has a neighbor, it is authenticated, if it has not,
it is not. We conclude that only neighboring nodes
can authenticate an existent node. We tested the
neighbor authentication method to determine under
which parameters it works (the region, the
transmission range etc.). We verified it for a
different range of nodes mobility and transmission
rage.
WINSYS 2008 - International Conference on Wireless Information Networks and Systems
50