An acknowledgment-based approach for implementing trusted routing protocol in MANET

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security and dependable transmission is testing errand in portable ad hoc system along the portability of system gadget bargained with assault and loss of information. For the aversion of assault and dependable transmission, different creators proposed a technique for verified directing convention, for example, SAODV and SBRP (secured backup routing protocol). The procedure of these strategies works alongside route disclosure and route maintenance, inventing, and route prolong kept up required more power utilization for that procedure. For the verification of gathering hub, gathering mark procedure is utilized, and rest mode edge idea is utilized for power minimization. Our proposed strategy is reenacted in ns-2 and contrast with other directing convention gives a superior act in contrast with vitality utilization and throughput of system. There are various approaches to compute trust for a node such as fuzzy trust approach, trust administration approach, and hybrid approach. Adaptive information dissemination (AID) is a mechanism which ensures the packets in a specific transmission, and it analyzes if there are any attacks by hackers. It encompasses of ensuring the packet count and route detection between source and destination with trusted path. Trust calculation based on the particular condition or context of a node, by sharing the context data onto the other nodes in the system would give a better solution to this problem. Here, we present a review on different trust association approaches in MANETs. We bring out immediate response from the methodologies for building up trust of the taking part hubs in a dynamic and unsure MANET atmosphere.

Cite

CITATION STYLE

APA

Dhanya, K., Jeyalakshmi, C., & Balakumar, A. (2020). An acknowledgment-based approach for implementing trusted routing protocol in MANET. In Lecture Notes in Networks and Systems (Vol. 89, pp. 1089–1096). Springer. https://doi.org/10.1007/978-981-15-0146-3_105

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free