Downloads: 125 | Views: 343
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014 | Popularity: 6.7 / 10
Trust based Secure Routing in MANET using EAASR
Deepika Mohanan, Sachin Godse
Abstract: Mobile ad hoc networks is a system of wireless mobile nodes that can be freely and dynamically self-organized in arbitrary and temporary network topologies without the need of wired or a centralised administration. Mobile ad hoc networks (MANETs) are vulnerable to security threats due to the inherent characteristics of such networks, such as the open wireless medium and dynamic topology. It is difficult to provide trusted and secure communications in adversarial environments, such as battlefields. The adversaries outside a network may deduce the information about the communicating nodes or traffic flows by passive traffic observation, even if the communications are encrypted. The nodes inside the network cannot be always trusted, since a valid node may be captured by rivals and becomes pernicious. As a result, anonymous communications are important for MANETs in adversarial environments, in which the nodes identifications and routes are replaced by random numbers or pseudonyms for protection purpose. Anonymity is defined as the state of being unknown within a set of subjects. The MANETs in adversarial environments, in this the public and group key can be initially deployed in the mobile nodes. It is assumed that there is no online security available when the network is deployed. A key-encrypted onion is used to record a discovered route. Group signature is used to validate the RREQ packet per hop. AASR experiences more cryptographic packet delay. The AASR can be improved by reducing the packet delay for which a unified trust management scheme is added that will enhance the security
Keywords: Anonymous Routing, Authenticated Routing, Onion Routing, Mobile Adhoc Network, Trust Management
Edition: Volume 3 Issue 11, November 2014
Pages: 2359 - 2361
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 97
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1112 - 1116Scalable Uninterrupted Network Service Using LTE
S. Kalaiyarasi, M. Manikandan
Downloads: 100
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1353 - 1357Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks
Manpreet Kaur, Pooja Saini
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 972 - 976Geo-Location Based Light Weight Bunching Algorithm for Hetro MANETs
Pidakala Sowmya, Kare Suresh Babu
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 741 - 745Priority Queuing Approach for Video Streaming Over Mobile Adhoc Network Using WEAC Protocol
A. Kamatchi, Dr. Annasaro Vijendran
Downloads: 107
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar