Trust Based Security Routing in Mobile Adhoc Networks

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 2

Abstract

Abstract: Ad hoc networks are widely used in military and other scientific areas. With nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own an fixed infrastructure. It also has a certain number of characteristics which make the security difficult. Routing is always the most significant part for any networks. One way is to transplant ordinary mechanisms in common networks with some improvement while the other way is to find some other factors such as trust to achieve the objective. This paper gives an overview about trust in MANETs and current research in trust based routing.

Authors and Affiliations

K. Seshadri Ramana , Dr. A. A. Chari , Prof. N. Kasiviswanth

Keywords

Related Articles

Comparison a Performance of Data Mining Algorithms (CPDMA) in Prediction Of Diabetes Disease

Detection of knowledge patterns in clinicial data through data mining. Data mining algorithms can be trained from past examples in clinical data and model the frequent times non-linear relationships between the independe...

DIGITAL IMAGE PROCESSING TECHNIQUES FOR DETECTION AND REMOVAL OF NOISE IN IMAGES IMPLEMENTING BLIND SOURCE SEPARATION

In different fields, the problem of Blind Source Separation (BSS) is known as a collection of linear combinations of unknown sources and worse the coefficients of the linear combinations that are unknown. The main proble...

Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules

A fuzzy filter is constructed from a set of fuzzy IF-THEN rules, these fuzzy rules come either from human experts or by matching input-output pairs .in this paper we propose a new fuzzy filter for the noise reduction of...

Zone Routing Protocol Using Anycast Addressing For Ad-Hoc Network

Zone Routing Protocol (ZRP) is a hybrid protocol that combines the advantages of both the proactive and reactive protocols. It is classified as: Intra Zone Routing, which uses hop count of the Nneighbors using proactive...

New Design Metrics for Complexity Estimation in Object Oriented Systems

This paper proposes four design metrics of class level for early and effective feedback to manage the quality of object-oriented software. These metrics measure the complexity induced by the use of various object-oriente...

Download PDF file
  • EP ID EP150164
  • DOI -
  • Views 111
  • Downloads 0

How To Cite

K. Seshadri Ramana, Dr. A. A. Chari, Prof. N. Kasiviswanth (2010). Trust Based Security Routing in Mobile Adhoc Networks. International Journal on Computer Science and Engineering, 2(2), 259-263. https://europub.co.uk/articles/-A-150164