A Trust Based Secure Routing Scheme for MANETS

被引:0
|
作者
Bhargavi, V. Sesha [1 ]
Seetha, M. [2 ]
Viswanadharaju, S. [3 ]
机构
[1] GNITS, Dept IT, Hyderabad, Andhra Pradesh, India
[2] GNITS, Dept CSE, Hyderabad, Andhra Pradesh, India
[3] JNTU, Dept CSE, Kondagattu, India
关键词
manet; security; file sharing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A MANET is a kind of wireless mobile network that can be easily established with the help of few infrastructure less connections. In such networks, every node is independent of its own and hence can act as a router and performs the job of routing as well. All the nodes in a MANET are dynamic in nature, in that the nodes can change their location from time to time due to their mobility feature, and any node is free to join and leave the network as and when needed and hence we can say that the topology changes dynamically. In recent days, security in MANET's has been the prime focus within the research community. There are many different attacks aimed at MANET's but solutions to these have been not paid much attention in literature. There are several methods that can deal with security issues in wired networks but the same cannot be used for wireless networks. There are many routing protocols proposed for MANET's but most of them exhibit poor performance in the presence of malicious nodes. This paper focuses on a new hybrid secure routing protocol S-DSR that establishes a secure communication path across the nodes in the network which can improve the packet delivery ratio and throughput etc. This protocol helps in finding the best path for secure file transmission based on the trust information from the neighbouring nodes. The proposed protocol has been implemented on NS-2. This protocol achieves better packet delivery ratio and reduced delay when compared with protocols like AODV, AOMDV etc.
引用
收藏
页码:565 / 570
页数:6
相关论文
共 50 条
  • [31] Secure cross-layer routing protocol with authentication key management scheme for manets
    Rama Devi G.R.
    Swamy Das M.
    Ramana Murthy M.V.
    Measurement: Sensors, 2023, 29
  • [32] Secure and Trust-Aware Routing Scheme in Wireless Sensor Networks
    Beheshtiasl, Azam
    Ghaffari, Ali
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (04) : 1799 - 1814
  • [33] Secure and Trust-Aware Routing Scheme in Wireless Sensor Networks
    Azam Beheshtiasl
    Ali Ghaffari
    Wireless Personal Communications, 2019, 107 : 1799 - 1814
  • [34] Recommendation Based Trust Model with an Effective Defence Scheme for MANETs
    Shabut, Antesar M.
    Dahal, Keshav P.
    Bista, Sanat Kumar
    Awan, Irfan U.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (10) : 2101 - 2115
  • [35] Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks
    Hu, Zhi
    Bie, Yuxia
    Zhao, Hong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [36] A novel fuzzy trust-based secure routing scheme in flying ad hoc networks
    Hosseinzadeh, Mehdi
    Mohammed, Adil Hussein
    Alenizi, Farhan A.
    Malik, Mazhar Hussain
    Yousefpoor, Efat
    Yousefpoor, Mohammad Sadegh
    Ahmed, Omed Hassan
    Rahmani, Amir Masoud
    Tightiz, Lilia
    VEHICULAR COMMUNICATIONS, 2023, 44
  • [37] Secure routing in MANETs using local times
    Stephen Dabideen
    J. J. Garcia-Luna-Aceves
    Wireless Networks, 2012, 18 : 811 - 826
  • [38] Distributed Trust-Based Multiple Attack Prevention for Secure MANETs
    Vaseer, Gurveen
    Ghai, Garima
    Ghai, Dhruva
    2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2018), 2018, : 108 - 113
  • [39] FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs
    Rafsanjani, Marjan Kuchaki
    Fatemidokht, Hamideh
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (11) : 1613 - 1621
  • [40] A Scalable, Distributed and Secure Routing Protocol for MANETs
    Qabajeh, Liana Khamis
    Kiah, Laiha Mat
    Qabajeh, Mohammad Moustafa
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 51 - 56