A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 2 | Views: 411

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 4.4 / 10


     

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar


Abstract: A mobile ad hoc network (MANET) is formed with wireless mobile devices (nodes) without the need for existing network infrastructure. Security design in MANET (Mobile advoc network) is complicated because of its features including lack of infrastructure, mobility of nodes; dynamic topology and open wireless medium. Due to this MANET suffer from many security vulnerability. To enhance the security, it is very important to rate the other node which is trustworthy. Hence a unified trust management security scheme is used. In trust management security scheme, the trust model has two components: direct observation and indirect observation. In direct observation, trust value is calculated from an observer node to observed node. On the other hand, indirect observation is also referred as secondhand information which is obtained from neighbor nodes of the observer node; the trust value is calculated between them. By combining these two components in the trust model, a more accurate trust value is obtained. This will help to improve throughput and packet delivery ratio in the network.


Keywords: MANETs, Security, Trust Management, uncertain reasoning


Edition: Volume 3 Issue 12, December 2014


Pages: 1380 - 1382



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Rajshree Ambatkar, Purnima Selokar, "A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1380-1382, https://www.ijsr.net/getabstract.php?paperid=SUB14691, DOI: https://www.doi.org/10.21275/SUB14691

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 642 - 647

Face Liveness to Identify Between Actual Face and Spoof Face

Lovely Pal, Renuka Singh

Share this Article
Top