Trust in mobile Ad Hoc Networks

被引:1
作者
Veeraraghavan, Prakash [1 ]
Limaye, Vikram [1 ]
机构
[1] La Trobe Univ, Dept Comp Sci & Comp Engn, Bundoora, Vic 3086, Australia
来源
ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS | 2007年
关键词
AODV; MANET; SID; trust management;
D O I
10.1109/ICTMICC.2007.4448655
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing a Wireless Ad Hoc Network is a major concern for researchers. Due to varied characteristics of Ad Hoc Networks, they are vulnerable to internal as well as external attacks. Many solutions have been proposed and currently being improved upon in this area. Most of these solutions involve encryption; secure routing, key management etc. Each of them is designed to operate in a particular situation, which may fail to work successfully in other scenarios. The present work in this paper offers an alternate to improve the trustworthiness of the neighbourhood and secure the routing procedure. It helps in computing the trust in neighbours and selecting the most secure route from the available ones for the data transfer. It also helps detecting the compromised node and virtually it removing from the network.
引用
收藏
页码:330 / 334
页数:5
相关论文
共 50 条
  • [21] Trust and Cluster based Authentication schemes in Mobile Ad Hoc Networks - A Review
    Sivagurunathan, S.
    Prathapchandran, K.
    2014 INTERNATIONAL CONFERENCE ON POWER SIGNALS CONTROL AND COMPUTATIONS (EPSCICON), 2014,
  • [22] A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks
    Gidijala, Naga Sathish
    Datla, Sanketh
    Joshi, R. C.
    CONTEMPORARY COMPUTING, PT 1, 2010, 94 : 32 - 41
  • [23] Cooperative routing in mobile ad hoc networks using fuzzy logic
    Venkanna, U.
    Velusamy, R. Leela
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2017, 25 (03) : 147 - 162
  • [24] Power Consumption Analysis in Mobile Ad Hoc Networks
    Bakalis, Panos
    Bello, Lawal
    Rapajic, Predrag
    Anang, Kwashie A.
    UKSIM-AMSS SEVENTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2013), 2013, : 527 - 532
  • [25] Balanced Trust Management for Ad Hoc Networks
    Mon, S. Feslin Anish
    Saha, Raj Kumar
    Rajaji, L.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 87 - 91
  • [26] Secure node misbehaviors in mobile ad hoc networks
    Chigan, CX
    Bandaru, R
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 4730 - 4734
  • [27] Enhancement of node connectivity for mobile ad hoc networks
    Shi, Xiyu
    Li, Fanzhi
    Adams, Christopher
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS, 2006, 6250
  • [28] Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning
    Wei, Zhexiong
    Tang, Helen
    Yu, F. Richard
    Wang, Maoyu
    Mason, Peter
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) : 4647 - 4658
  • [29] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [30] Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks
    Chen, Ing-Ray
    Guo, Jia
    Bao, Fenye
    Cho, Jin-Hee
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,