Trust in mobile Ad Hoc Networks

被引:1
作者
Veeraraghavan, Prakash [1 ]
Limaye, Vikram [1 ]
机构
[1] La Trobe Univ, Dept Comp Sci & Comp Engn, Bundoora, Vic 3086, Australia
来源
ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS | 2007年
关键词
AODV; MANET; SID; trust management;
D O I
10.1109/ICTMICC.2007.4448655
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing a Wireless Ad Hoc Network is a major concern for researchers. Due to varied characteristics of Ad Hoc Networks, they are vulnerable to internal as well as external attacks. Many solutions have been proposed and currently being improved upon in this area. Most of these solutions involve encryption; secure routing, key management etc. Each of them is designed to operate in a particular situation, which may fail to work successfully in other scenarios. The present work in this paper offers an alternate to improve the trustworthiness of the neighbourhood and secure the routing procedure. It helps in computing the trust in neighbours and selecting the most secure route from the available ones for the data transfer. It also helps detecting the compromised node and virtually it removing from the network.
引用
收藏
页码:330 / 334
页数:5
相关论文
共 50 条
[41]   Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-Hoc Networks [J].
Natarajan, Vivek ;
Zhu, Sencun ;
Srivatsa, Mudhakar ;
Opper, Jeff .
2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, :376-383
[42]   A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad hoc Networks [J].
Guo, Ji ;
Marshall, Alan ;
Zhou, Bosheng .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :142-149
[43]   A cluster-based trust-aware routing protocol for mobile ad hoc networks [J].
Haidar Safa ;
Hassan Artail ;
Diana Tabet .
Wireless Networks, 2010, 16 :969-984
[44]   Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks [J].
Kumar, Sunil ;
Dutta, Kamlesh .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (04) :2029-2052
[45]   Explicit Multicasting for Mobile Ad Hoc Networks [J].
Lusheng Ji ;
M. Scott Corson .
Mobile Networks and Applications, 2003, 8 :535-549
[46]   Efficient authentication scheme for routing in mobile ad hoc networks [J].
Xu, SD ;
Mu, Y ;
Susilo, W .
EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 :854-863
[47]   Analysis of Energy Consumption in Dynamic Mobile Ad Hoc Networks [J].
Das, Indrani ;
Shaw, Rabindra Nath ;
Das, Sanjoy .
DATA COMMUNICATION AND NETWORKS, GUCON 2019, 2020, 1049 :235-243
[48]   Distributed Channel Assignment and Routing in Mobile Ad Hoc Networks [J].
Prashanth, K. V. S. ;
Trivedi, Aditya .
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, :245-248
[49]   A Novel Proactive Routing Protocol in Mobile Ad Hoc Networks [J].
Tepsic, Dejan ;
Veinovic, Mladen ;
Zivkovic, Dejan ;
Ilic, Nadja .
AD HOC & SENSOR WIRELESS NETWORKS, 2015, 27 (3-4) :239-261
[50]   Consensus in Sparse, Mobile Ad Hoc Networks [J].
Alekeish, Khaled ;
Ezhilchelvan, Paul .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (03) :467-474