A REVIEW ON TRUST BASED SECURE ROUTING PROTOCOLS IN AD-HOC NETWORKS

Sandeep Patil, Dr. L.S. Admuthe, Dr. M. R. Patil

Abstract


A Mobile Ad-Hoc Network (MANET) facilitates communication between nodes whenever & wherever required without any fixed infrastructure. Due to its self-configuring nature, arbitrary topology is formed through wireless links. Such type of Ad-Hoc networks are required at battlefield, rescue operations, during disaster management etc. Although this technology gives a broad range of application in critical conditions, it has its own lacuna's. Most importantly, security is the basic issue in this communication mode due to dynamicity of nodes. To ensure secure communication, various types of cryptographic & trust based models have been put forwarded. However, cryptographic methods are not feasible due to intensive computation & low infrastructure network(MANET). Hence trust based models have come in to the existence. The present study includes review on various trust models, with their protocols, advantages & challenges.

Keywords


MANET; Ad-Hoc network; Trust; Routing protocols.

Full Text:

PDF

References


X. Li, Z. Jia, P. Zhang, R. Zhang, and H. Wang, “Trust-based on-demand multipath routing in mobile ad hoc networks,” Information Security, IET, vol. 4, issue 4, pp. 212-232, Dec 2010.

R. S. Mangrulkar, Dr. Mohammad Atique, “Trust based secured Adhoc on demand distance vector routing protocol for mobile Adhoc network”, IEEE, 2010.

S. Neelakandan, J. Gokul Anand, “Trust Based Optimal Routing in MANET’s”, in Proc. IEEE ICETECT, pp. 1150-1156, 2011.

N. Bhalaji, A. Shanmugam, “Dynamic Trust Based Method to Mitigate Greyhole Attack in Mobile Adhoc Networks”, in Proc. Elsvier Procedia Engineering 30 (2012) pp. 881-888.

Radhika Saini, Ravinder Kumar Gautam, “Establishment of Dynamic Trust Among Nodes in Mobile Ad Hoc Networks”, in Proc. IEEE, 2011, pp. 346-349.

Jing-Wei Huang, Isaac Woungang, Han-Chieh Chao, Mohammad S. Obidat, Ting-Yun Chi, Sanjay K. Dhurandher, “Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks”, in Proc. IEEE Globecom 2011.

N, Marchang, R. Datta, “Light-weight trust-based routing protocol for mobile ad hoc networks”, IET inf. Secur., 2012, Vol. 6, Iss. 2, pp. 77-83.

Issac Woungang, Mohammed S. Obaidat, Sanay K. Dhurandher, Han-Chieh Chao, Chris Liu, “Trust-Enhanced Message Security Protocol for Mobile Ad Hoc Networks”, IEEE ICC 2012, pp. 988-992.

Thanigaivel G, Ashwin Kumar N, Yogesh P, “TRUNCMAN: Trust based Routing Mechanism Using Non-Cooperative Movement in Mobile Ad-hoc Network”, IEEE, pp. 261-266, 2012.

S. Neelavathy Pari, B. Narmadhdevi, Sridharan Duraisamy, “Requisite Trust-Based Secure Routing Protocol for MANETs”, in Proc. IEEE ICRTIT 2012, pp. 276-281.

Fidel Thachil, K C Shet, “A trust based approach for AODV protocol to mitigate black hole attack in MANET”, IEEE International Conference on Computing Sciences 2012, pp. 281-285.

Naveen K. Gupta, Kavita Pandey, “Trust Based Ad-hoc On Demand Routing Protocol for MANET”, IEEE, pp. 225-231, 2013.

Shalabh Jain, John S. Baras, “Distributed Trust Based Routing in Mobile Ad-Hoc Networks”, IEEE Computer Society 2013, pp. 1801-1807.

Sahil Gupta, Isaac Woungang, Sanjay K. Dhurandher, Arun Kumar, “Trust-Based Security Protocol Against Blackhole Attacks in Opportunistic Networks”, IEEE, WiMob, 2013, pp. 724-729.

Akshai Aggarwal, Savita Gandhi, Nirbhay Chaubey, Keyurbhai A Jani, “Trust Based Secure on Demand Routing Protocol(TSDRP) for MANETs”, IEEE, 2014, pp. 432-438.

V. L. Pavani, B. Satyanarayana, “A Reliable Data Delivery Using Trust Management System Based on Node Behaviour Predication in MANET”, IEEE iCATccT 2015, pp. 280-285.

Waleed S. Alnumay, Pushpita Chatterjee, Uttam Ghosh, “A Trusted Framework for secure Routing in Wireless Ad Hoc Networks”, IEEE 2015, pp. 190-195.

Abrar Omar Alkhamisi, Seyed M Buhari, “Trusted Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET”, IEEE Computer Society, 2016, pp. 212-219.




DOI: https://doi.org/10.26483/ijarcs.v8i9.5075

Refbacks

  • There are currently no refbacks.




Copyright (c) 2017 International Journal of Advanced Research in Computer Science