A trust based technique to isolate non-forwarding nodes in DSR basedmobile Adhoc networks

3Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this manuscript we deal with securing routing protocol of mobileadhoc network against Non forwarding nodes which originate selfish or passive attack .due to its unique feature of open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Further most of the mobile adhoc routing protocols assume that nodes are trust worthy and cooperative this renders them vulnerable to various types of attacks. In this scheme the nodes which originate the passive or selfish attacks are identified and isolated from the routing and data forwarding function. We considered DSR protocol in NS-2 for our simulation. The results obtained illustrates that the proposed scheme outscores the traditional DSR in all metrics. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bhalaji, N., & Shanmugam, A. (2010). A trust based technique to isolate non-forwarding nodes in DSR basedmobile Adhoc networks. In Communications in Computer and Information Science (Vol. 89 CCIS, pp. 123–131). https://doi.org/10.1007/978-3-642-14478-3_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free