International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 125 | Views: 343

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.7 / 10


     

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse


Abstract: Mobile ad hoc networks is a system of wireless mobile nodes that can be freely and dynamically self-organized in arbitrary and temporary network topologies without the need of wired or a centralised administration. Mobile ad hoc networks (MANETs) are vulnerable to security threats due to the inherent characteristics of such networks, such as the open wireless medium and dynamic topology. It is difficult to provide trusted and secure communications in adversarial environments, such as battlefields. The adversaries outside a network may deduce the information about the communicating nodes or traffic flows by passive traffic observation, even if the communications are encrypted. The nodes inside the network cannot be always trusted, since a valid node may be captured by rivals and becomes pernicious. As a result, anonymous communications are important for MANETs in adversarial environments, in which the nodes identifications and routes are replaced by random numbers or pseudonyms for protection purpose. Anonymity is defined as the state of being unknown within a set of subjects. The MANETs in adversarial environments, in this the public and group key can be initially deployed in the mobile nodes. It is assumed that there is no online security available when the network is deployed. A key-encrypted onion is used to record a discovered route. Group signature is used to validate the RREQ packet per hop. AASR experiences more cryptographic packet delay. The AASR can be improved by reducing the packet delay for which a unified trust management scheme is added that will enhance the security


Keywords: Anonymous Routing, Authenticated Routing, Onion Routing, Mobile Adhoc Network, Trust Management


Edition: Volume 3 Issue 11, November 2014


Pages: 2359 - 2361



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Deepika Mohanan, Sachin Godse, "Trust based Secure Routing in MANET using EAASR", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2359-2361, https://www.ijsr.net/getabstract.php?paperid=OCT141466, DOI: https://www.doi.org/10.21275/OCT141466



Similar Articles

Downloads: 97

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1353 - 1357

Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks

Manpreet Kaur, Pooja Saini

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 972 - 976

Geo-Location Based Light Weight Bunching Algorithm for Hetro MANETs

Pidakala Sowmya, Kare Suresh Babu

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 741 - 745

Priority Queuing Approach for Video Streaming Over Mobile Adhoc Network Using WEAC Protocol

A. Kamatchi, Dr. Annasaro Vijendran

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article
Top