In this manuscript we deal with securing routing protocol of mobileadhoc network against Non forwarding nodes which originate selfish or passive attack .due to its unique feature of open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Further most of the mobile adhoc routing protocols assume that nodes are trust worthy and cooperative this renders them vulnerable to various types of attacks. In this scheme the nodes which originate the passive or selfish attacks are identified and isolated from the routing and data forwarding function. We considered DSR protocol in NS-2 for our simulation. The results obtained illustrates that the proposed scheme outscores the traditional DSR in all metrics. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Bhalaji, N., & Shanmugam, A. (2010). A trust based technique to isolate non-forwarding nodes in DSR basedmobile Adhoc networks. In Communications in Computer and Information Science (Vol. 89 CCIS, pp. 123–131). https://doi.org/10.1007/978-3-642-14478-3_13
Mendeley helps you to discover research relevant for your work.