2014
DOI: 10.7763/jacn.2013.v1.56
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Trust Based Routing Protocols in MANETs

Abstract: Abstract-A mobile ad-hoc network is a self-configuring network of mobile hosts connected by wireless links which together form an arbitrary topology. Due to lack of centralized control, dynamic network topology and multihop communications, the provision of making routing secure in mobile ad hoc networks is much more challenging than the security in infrastructure based networks. Several protocols for secure routing in ad hoc networks have been proposed in the literature. But due to their limitations, there is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 26 publications
(39 reference statements)
0
5
0
Order By: Relevance
“…LT is made by measuring the signal strength between two nodes and the error ratio compared to packet transmission for a certain period of time. In order to obtain the local trust information of node N, Received Signal Strength (RSS) in the neighboring nodes of node N is measured using equation (1).…”
Section: Member Node Trust Measurement Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…LT is made by measuring the signal strength between two nodes and the error ratio compared to packet transmission for a certain period of time. In order to obtain the local trust information of node N, Received Signal Strength (RSS) in the neighboring nodes of node N is measured using equation (1).…”
Section: Member Node Trust Measurement Techniquementioning
confidence: 99%
“…The three parameter values measured in this way are compared with the average values in the cluster measured by the CA and then the flag values for normal (1), suspicious (0), and attack (-1) is set. In node classifier, even if at least one of the three parameters has an attack (-1) flag, the node is classified as an attack node, and if there are two or more suspicions (0), it is classified as a boundary node.…”
Section: 𝐢 π‘˜ (𝐴𝑣𝑔(𝑃mentioning
confidence: 99%
See 1 more Smart Citation
“…is has a disadvantage that route path discovery is delayed a lot because this does not allow intermediate nodes on the path to transmit RREP packets. e trust-embedded AODV (T-AODV) technique is an extension of the trust-based AODV technique in which the reliability is calculated by distributing and updated [39]. is is performed only when malicious nodes send erroneous information.…”
Section: Trust-based Routing Protocolmentioning
confidence: 99%
“…is technique assumes that all nodes have the same frequency range. It is proposed that intermedia node plays a role as a trust gateway maintaining the trust level in order to avoid malicious nodes in [39]. Each node monitors its neighbor and maintains its reliability directly.…”
Section: Trust-based Routing Protocolmentioning
confidence: 99%