2018
DOI: 10.1007/978-981-13-1513-8_41
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Trust-Based Routing Protocol for MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…erefore, it is studying to minimize the number of control messages. e routing protocols of this type include Destination Sequenced Distance Vector (DSDV), Wireless Routing Protocol (WRP), and Source-Tree Adaptive Routing (STAR) [11][12][13].…”
Section: Routing Protocolsmentioning
confidence: 99%
“…erefore, it is studying to minimize the number of control messages. e routing protocols of this type include Destination Sequenced Distance Vector (DSDV), Wireless Routing Protocol (WRP), and Source-Tree Adaptive Routing (STAR) [11][12][13].…”
Section: Routing Protocolsmentioning
confidence: 99%
“…Mandhare et al [2] proposed Secure Routing Protocol (SRP) that utilizes symmetric cryptography to give start to end validation. The convention depends on route requesting technique and it requires a Security Association (SA) among source and destination node.…”
Section: Literature Surveymentioning
confidence: 99%
“…MANETs are made out of self-sorted remote gadgets that participate to control the system and forward one another messages [1]. The arrangement of secure routing to these systems faces explicit vulnerabilities because of the absence of fixed framework and the non-dependable clients that need to utilize the system [2]. MANETs are mainly used for establishing communication during a wired system fails and during natural disasters.…”
Section: Introductionmentioning
confidence: 99%
“…Secure protocol resilient to Byzantaine failures (SPRBF) offers resistance from byzantine failure; however, the implementation cycle of it is quite complex to design [22]. SRP [23] is known for its discovery of correct path in vulnerable network; however, it doesn't uses encryption over its routing channel and thereby they cannot resist invisible node attack. ARAN [24] offers robust network structure with supportability of public key encryption; however, it offers higher processing overhead.…”
Section: Problems In Existing Manet Security Solutionmentioning
confidence: 99%