Downloads: 2 | Views: 411
Review Papers | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 4.4 / 10
A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Abstract: A mobile ad hoc network (MANET) is formed with wireless mobile devices (nodes) without the need for existing network infrastructure. Security design in MANET (Mobile advoc network) is complicated because of its features including lack of infrastructure, mobility of nodes; dynamic topology and open wireless medium. Due to this MANET suffer from many security vulnerability. To enhance the security, it is very important to rate the other node which is trustworthy. Hence a unified trust management security scheme is used. In trust management security scheme, the trust model has two components: direct observation and indirect observation. In direct observation, trust value is calculated from an observer node to observed node. On the other hand, indirect observation is also referred as secondhand information which is obtained from neighbor nodes of the observer node; the trust value is calculated between them. By combining these two components in the trust model, a more accurate trust value is obtained. This will help to improve throughput and packet delivery ratio in the network.
Keywords: MANETs, Security, Trust Management, uncertain reasoning
Edition: Volume 3 Issue 12, December 2014
Pages: 1380 - 1382
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 642 - 647Face Liveness to Identify Between Actual Face and Spoof Face
Lovely Pal, Renuka Singh