Safe Trust Alert Routing in MANET
Keywords:
MANET, security, Reactive routing, Proactive routing, hybrid technologyAbstract
The main characteristic of the ad-hoc network is dynamic topology. In this, nodes modifications its position usually and these nodes have to be compelled to be compelled to adapt for the topology amendment. Nodes can amendment position quite frequently that mean the standard of the network. For quick info transmission, we'd sort of a routing protocol that adapts to topology changes. For our convenience, we've projected a fast and secure protocol that's proactive and reactive in nature. Proactive nature used for adding the node into list, as a results of it taking a short while to line the selection relating to node. And reactive nature used for locating the path for providing fast transmission.
References
.http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
.B.Thanikaivel, B. Pranisa “Fast and Secure data transmission in MANET” 2012
.Michele Nogueira Lima , Aldri Luiz dos Santos ,Guy Pujolle “A Survey of Survivability in Mobile Ad Hoc Networks” , 2007.
.V. Anitha, Dr. J. Akilandeswari “Secured Message Transmission in Mobile AD HOC Networks through Identification and Removal of Byzantine Failures”, 2010
. Jiejun Kong, Xiaoyan Hong,Mario Gerla. “An Identityfree and On Demand Routing Scheme against Anonymity Threats in Mobile Ad-hoc Networks” 2007
.Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, and Ahmed Safwat Abd El-Radi. “Performance Evaluation of Mobility Speed over MANET Routing Protocols”, 2010.
.Ajay Vikram Singh, Prof. M. Afshar Alam and Prof. Bani Singh. “Mobility Based Proactive and Reactive Routing Algorithm in Mobile Ad hoc Networks (MANETs)”, 2011
. “Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism” Santhosh Krishna B.V, Mrs.Vallikannu A.L.
.Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng. “Anonymous Secure Routing in Mobile Ad-Hoc Networks”,2004
. Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman.“SybilGuard: Defending Against Sybil Attacks via Social Networks” 2008
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.