Trust in mobile Ad Hoc Networks

被引:1
作者
Veeraraghavan, Prakash [1 ]
Limaye, Vikram [1 ]
机构
[1] La Trobe Univ, Dept Comp Sci & Comp Engn, Bundoora, Vic 3086, Australia
来源
ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS | 2007年
关键词
AODV; MANET; SID; trust management;
D O I
10.1109/ICTMICC.2007.4448655
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing a Wireless Ad Hoc Network is a major concern for researchers. Due to varied characteristics of Ad Hoc Networks, they are vulnerable to internal as well as external attacks. Many solutions have been proposed and currently being improved upon in this area. Most of these solutions involve encryption; secure routing, key management etc. Each of them is designed to operate in a particular situation, which may fail to work successfully in other scenarios. The present work in this paper offers an alternate to improve the trustworthiness of the neighbourhood and secure the routing procedure. It helps in computing the trust in neighbours and selecting the most secure route from the available ones for the data transfer. It also helps detecting the compromised node and virtually it removing from the network.
引用
收藏
页码:330 / 334
页数:5
相关论文
共 50 条
[31]   Friendship Based Trust Model to secure routing protocols in Mobile Ad hoc Networks [J].
Shabut, Antesar M. ;
Dahal, Keshav ;
Awan, Irfan .
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, :280-287
[32]   Trust management in mobile ad hoc networks for bias minimization and application performance maximization [J].
Chen, Ing-Ray ;
Guo, Jia ;
Sao, Fenye ;
Cho, Jin-Hee .
AD HOC NETWORKS, 2014, 19 :59-74
[33]   Certification-based trust models in mobile ad hoc networks: A survey and taxonomy [J].
Omar, Mawloud ;
Challal, Yacine ;
Bouabdallah, Abdelmadjid .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) :268-286
[34]   MIPMANET -: Mobile IP for mobile ad hoc networks [J].
Jönsson, U ;
Alriksson, F ;
Larsson, T ;
Johansson, P ;
Maguire, GQ .
MOBIHOC: 2000 FIRST ANNUAL WORKSHOP ON MOBILE AND AD HOC NETWORKING AND COMPUTING, 2000, :75-85
[35]   Source based Trusted AODV Routing Protocol for Mobile Ad hoc Networks [J].
Renold, A. Pravin ;
Parthasarathy, R. .
PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, :1271-1275
[36]   A cluster-based trust-aware routing protocol for mobile ad hoc networks [J].
Safa, Haidar ;
Artail, Hassan ;
Tabet, Diana .
WIRELESS NETWORKS, 2010, 16 (04) :969-984
[37]   A NOVEL TRUST ROUTING SCHEME BASED ON NODE BEHAVIOUR EVALUATION FOR MOBILE AD HOC NETWORKS [J].
Chen, Hongsong ;
Fu Zhongchuan .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (08) :1063-1074
[38]   Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks [J].
Sunil Kumar ;
Kamlesh Dutta .
Wireless Personal Communications, 2018, 101 :2029-2052
[39]   Enhanced AODV routing analysis for mobile Ad Hoc networks [J].
Arvind Kumar ;
Adesh Kumar ;
Anurag Vijay Agrawal .
Discover Electronics, 2 (1)
[40]   Evaluation of the Energy Consumption Introduced by a Trust Management Scheme on Mobile Ad-hoc Networks [J].
Lupia, Andrea ;
De Rango, Floriano .
JOURNAL OF NETWORKS, 2015, 10 (04) :240-251