Abstract
Ad Hoc network often termed as an infrastructure-less, self- organized or spontaneous network.The execution and survival of an ad-hoc network is solely dependent upon the cooperative and trusting nature of its nodes. However, this naive dependency on intermediate nodes makes the ad-hoc network vulnerable to passive and active attacks by malicious nodes and cause inflict severe damage. A number of protocols have been developed to secure ad-hoc networks using cryptographic schemes, but all rely on the presence of trust authority. Due to mobility of nodes and limitation of resources in wireless network one interesting research area in MANET is routing. This paper offers various trust models and trust based routing protocols to improve the trustworthiness of the neighborhood.Thus it helps in selecting the most secure and trustworthy route from the available ones for the data transfer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jaafar, M.A., Zukarnain, Z.A.: Performance comparisons of AODV, Secure AODV and Adaptive secure AODV Routing Protocols in Free Attack Simulation Environment. European Journal of Scintific Research 32(3), 430–443 (2009)
Xu, S., Mu, Y., Susilo, W.: Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes. Journal of Networks 1(1) (May 2006)
Li, Q., Zhao, M., Walker, J., Perrig, A.: SEAR: A Secure Efficient Ad Hoc On Demand Routing Protocol for Wireless Networks. Intel cooperation and University of Rutger
Eichler, S., Roman, C.: Challenges of Secure Routing in MANETs:A Simulative Approach using AODV-SEC. Institute of Communication Network, Germany
Veeraraghavan, P., Limaye, V.: Trust in Mobile Ad hoc Network. In: Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, Penang, Malaysia, May 14-17 (2007)
Seshadri Ramana, K., Chari, A.A., Kasiviswanth, N.: Trust Based Security Routing in Mobile Adhoc Networks. Global Journal of Computer Science and Technology, 121–126
Misra, S., Woungang, I., Misra, S.C.: Guide to Wireless Ad Hoc Networks. Computer Communications and Networks Series, pp. 473–503. Springer, Heidelberg
Wenxhong, Y., Tong, W., Zhenyu, Z.: A General trust model based on trust algebra. In: An Intranational Conference on Multimedia Information and Network Security. IEEE, Los Alamitos (2009)
Biao, C., Zhishu, L., Xun, L.: PRN-A Novel trust model. In: First International Symposium on Data,Privacy and E-Commorce. IEEE, Los Alamitos (2007)
Chuanhe, H., Yong, C., Hao, Z.: A Trusted Routing Protocol for Mobile Ad hoc networks. Wuhan University, china
Jassim, H.S., Yussof, S., Kiong, T.S., Koh, S.P., Ismail, R.: A Routing Protocol based on Trusted and shortest Path Selection for Mobile Ad hoc Network. In: 9th International Conference on Communication. IEEE, Los Alamitos (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Talati, M.V., Valiveti, S., Kotecha, K. (2010). Trust Based Routing in Ad Hoc Network. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-17604-3_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17603-6
Online ISBN: 978-3-642-17604-3
eBook Packages: Computer ScienceComputer Science (R0)