Trust Based Security Routing in Mobile Adhoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 2
Abstract
Abstract: Ad hoc networks are widely used in military and other scientific areas. With nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own an fixed infrastructure. It also has a certain number of characteristics which make the security difficult. Routing is always the most significant part for any networks. One way is to transplant ordinary mechanisms in common networks with some improvement while the other way is to find some other factors such as trust to achieve the objective. This paper gives an overview about trust in MANETs and current research in trust based routing.
Authors and Affiliations
K. Seshadri Ramana , Dr. A. A. Chari , Prof. N. Kasiviswanth
Comparison a Performance of Data Mining Algorithms (CPDMA) in Prediction Of Diabetes Disease
Detection of knowledge patterns in clinicial data through data mining. Data mining algorithms can be trained from past examples in clinical data and model the frequent times non-linear relationships between the independe...
DIGITAL IMAGE PROCESSING TECHNIQUES FOR DETECTION AND REMOVAL OF NOISE IN IMAGES IMPLEMENTING BLIND SOURCE SEPARATION
In different fields, the problem of Blind Source Separation (BSS) is known as a collection of linear combinations of unknown sources and worse the coefficients of the linear combinations that are unknown. The main proble...
Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules
A fuzzy filter is constructed from a set of fuzzy IF-THEN rules, these fuzzy rules come either from human experts or by matching input-output pairs .in this paper we propose a new fuzzy filter for the noise reduction of...
Zone Routing Protocol Using Anycast Addressing For Ad-Hoc Network
Zone Routing Protocol (ZRP) is a hybrid protocol that combines the advantages of both the proactive and reactive protocols. It is classified as: Intra Zone Routing, which uses hop count of the Nneighbors using proactive...
New Design Metrics for Complexity Estimation in Object Oriented Systems
This paper proposes four design metrics of class level for early and effective feedback to manage the quality of object-oriented software. These metrics measure the complexity induced by the use of various object-oriente...