Routing and Security Issues for Trust Based Framework inMobile Ad Hoc Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Mobile means moving and Ad Hoc means temporary without any fixed infrastructure, so mobile adhoc networks (MANETs) are a kind of temporary networks in which nodes are moving without any fixedinfrastructure or centralized administration. It is the new emerging technology which enables user tocommunicate without any physical infrastructure regardless of their geographical location, that’s why it is alsoreferred to as an “infrastructure less” network. Unfortunately, ad hoc networks are particularly vulnerable duemainly to their lack of infrastructure. Other reasons could be: high mobility, wireless links, limited bandwidths,lack of boundaries, short lifetime batteries and weak capacity of equipments. The execution and survival of adhoc networks depends on cooperative and trusting nature of the distributed nodes. There is a commonassumption in the routing protocols that all nodes are trustworthy and cooperative. However, this naïvedependency on intermediate nodes makes the ad hoc networks vulnerable to passive and active attacks bymalicious nodes. Trust based routing and Security in MANETs are the most important concern for the basicfunctionality of Network. The availability of network services, confidentiality and integrity of data can beachieved by assuring that routing & security issues have been met. In this paper an attempt has been made toreview various routing and security issues for trust based framework in MANETs.
Authors and Affiliations
Mukesh Kumar Garg , Neeta Singh
Reducing Energy Consumption with Dvfs for Real-Time Services in Cloud Computing
Abstract: Cloud computing has revolutionized the information technology industry by enabling elastic on demand provisioning of computing resources. The increase of Cloud computing has resulted in the organization of larg...
An Approach to Sentiment Analysis using Artificial Neural Network with Comparative Analysis of Different Techniques
Abstract : Sentiment Analysis is the process of identifying whether the opinion or reviews expressed in a piece of work is positive, negative or neutral. Sentiment analysis is useful in social media monitoring to automat...
Occlusion detection in video sequences
Abstract: An occlusion is the region between two overlapping objects with disparate motion. Detecting these occluded objects is crucial for many of the video processing. The Occlusion detection is decomposed into two ind...
Securing IPv6’s Neighbour and Router Discovery, using Locally Authentication Process
today’s world.Internet Engineering Task Force (IETF), in IPv6, allowed nodes to Auto configure using neighbour discovery protocol. Neighbour Discovery (ND) and Address auto-configuration mechanisms may be protect...
Data Protection Based On Dynamic Encryption for Secure Cloud Computing
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared poo...