scholarly journals Trust Based Secure Routing Mechanism in Mobile Adhoc Networks for Enhancing the Routing Performances

Mobile Adhoc Networks enforces certain level of challenges for the researchers since they operate without a fixed infrastructure. Moreover the constant movement of nodes gives additional challenges while implementing any type of solutions. Similarly enforcing secure mode of routing in mobile adhoc networks creates lot of hurdles for the implementers. This paper addresses these issues, by computing the trust of each node and updating the trust tables of the respective nodes and the cluster head. This paper focus in designing a trusted secure mechanism for routing. The objective of this work is to calculate the trust of nodes using various trust methods. Later the calculated trust is updated with the trust table of the cluster head by forming a web of trust. This will enable a secure channel of communication among the adhoc nodes. After incorporating the newly computed trust, the routing performance of well known routing protocol say AODV, is evaluated for various routing parameters and it is compared with the performance of Trusted AODV(TODV).

2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2019 ◽  
Vol 8 (2) ◽  
pp. 4187-4194

Usually, the nodes in Mobile Adhoc Networks (MANET) are bounded with the limited power resources to interact with each other nodes without any backbone infrastructures. As a result, an allocation of unbalanced traffic among nodes may increase the power dissipation in the overloaded nodes and path failures that degrade the network lifetime. To tackle this problem, an on-demand Power and LoadAware (PLA) multipath node-disjoint source routing scheme was proposed based on the Dynamic Source Routing (DSR) protocol that uses a new cost function to determine the multiple nodedisjoint power and select the load-aware optimal paths to their destinations. However, this protocol was affected by control overhead and the reliable packet delivery was also not effective. Hence in this article, Power and Load-aware i.e., Utility-Aware Reliable Opportunistic Routing (UAROR) protocol is proposed to enhance the efficiency and reliability of the routing protocol. In this protocol, topology control and link lifetime prediction algorithms are integrated into the PLA algorithm to predict the effect of the node mobility on routing performance. The link prediction algorithm considers both mobility speed and direction for improving the accuracy. As well, an opportunistic topology control algorithm uses packet delivery ratio to maintain the node’s stability. Moreover, Utility-Aware Enhanced ROR (UAEROR) protocol is proposed to improve the node’s stability and reduce the control overhead by employing the neighbor detection algorithm that uses degree and reachability of nodes. Finally, the simulation results show that the effectiveness of the proposed protocol compared to the existing protocol in terms of throughput, end-to-end delay, packet delivery ratio, network lifetime, energy consumption and control overhead


2014 ◽  
Vol 14 (2) ◽  
pp. 24-30 ◽  
Author(s):  
Gundala Swathi ◽  
R. Saravanan

Abstract In recent years synchronization plays a major issue for secure transmission in mobile adhoc networks. When an attacker modifies the time synchronization algorithm, the nodes will have faulty estimates of other nodes location, leading to chaos. While transmitting under these adverse conditions, packets might be lost or might be sent to wrong locations. Data replication and data diffusion are two methods which are used to solve the problem of data availability. In this paper we propose an algorithm for secure multi hop transmission used for external attacks.


Sign in / Sign up

Export Citation Format

Share Document