A REVIEW ON TRUST BASED SECURE ROUTING PROTOCOLS IN AD-HOC NETWORKS
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
X. Li, Z. Jia, P. Zhang, R. Zhang, and H. Wang, “Trust-based on-demand multipath routing in mobile ad hoc networks,†Information Security, IET, vol. 4, issue 4, pp. 212-232, Dec 2010.
R. S. Mangrulkar, Dr. Mohammad Atique, “Trust based secured Adhoc on demand distance vector routing protocol for mobile Adhoc networkâ€, IEEE, 2010.
S. Neelakandan, J. Gokul Anand, “Trust Based Optimal Routing in MANET’sâ€, in Proc. IEEE ICETECT, pp. 1150-1156, 2011.
N. Bhalaji, A. Shanmugam, “Dynamic Trust Based Method to Mitigate Greyhole Attack in Mobile Adhoc Networksâ€, in Proc. Elsvier Procedia Engineering 30 (2012) pp. 881-888.
Radhika Saini, Ravinder Kumar Gautam, “Establishment of Dynamic Trust Among Nodes in Mobile Ad Hoc Networksâ€, in Proc. IEEE, 2011, pp. 346-349.
Jing-Wei Huang, Isaac Woungang, Han-Chieh Chao, Mohammad S. Obidat, Ting-Yun Chi, Sanjay K. Dhurandher, “Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networksâ€, in Proc. IEEE Globecom 2011.
N, Marchang, R. Datta, “Light-weight trust-based routing protocol for mobile ad hoc networksâ€, IET inf. Secur., 2012, Vol. 6, Iss. 2, pp. 77-83.
Issac Woungang, Mohammed S. Obaidat, Sanay K. Dhurandher, Han-Chieh Chao, Chris Liu, “Trust-Enhanced Message Security Protocol for Mobile Ad Hoc Networksâ€, IEEE ICC 2012, pp. 988-992.
Thanigaivel G, Ashwin Kumar N, Yogesh P, “TRUNCMAN: Trust based Routing Mechanism Using Non-Cooperative Movement in Mobile Ad-hoc Networkâ€, IEEE, pp. 261-266, 2012.
S. Neelavathy Pari, B. Narmadhdevi, Sridharan Duraisamy, “Requisite Trust-Based Secure Routing Protocol for MANETsâ€, in Proc. IEEE ICRTIT 2012, pp. 276-281.
Fidel Thachil, K C Shet, “A trust based approach for AODV protocol to mitigate black hole attack in MANETâ€, IEEE International Conference on Computing Sciences 2012, pp. 281-285.
Naveen K. Gupta, Kavita Pandey, “Trust Based Ad-hoc On Demand Routing Protocol for MANETâ€, IEEE, pp. 225-231, 2013.
Shalabh Jain, John S. Baras, “Distributed Trust Based Routing in Mobile Ad-Hoc Networksâ€, IEEE Computer Society 2013, pp. 1801-1807.
Sahil Gupta, Isaac Woungang, Sanjay K. Dhurandher, Arun Kumar, “Trust-Based Security Protocol Against Blackhole Attacks in Opportunistic Networksâ€, IEEE, WiMob, 2013, pp. 724-729.
Akshai Aggarwal, Savita Gandhi, Nirbhay Chaubey, Keyurbhai A Jani, “Trust Based Secure on Demand Routing Protocol(TSDRP) for MANETsâ€, IEEE, 2014, pp. 432-438.
V. L. Pavani, B. Satyanarayana, “A Reliable Data Delivery Using Trust Management System Based on Node Behaviour Predication in MANETâ€, IEEE iCATccT 2015, pp. 280-285.
Waleed S. Alnumay, Pushpita Chatterjee, Uttam Ghosh, “A Trusted Framework for secure Routing in Wireless Ad Hoc Networksâ€, IEEE 2015, pp. 190-195.
Abrar Omar Alkhamisi, Seyed M Buhari, “Trusted Secure Adhoc On-Demand Multipath Distance Vector Routing in MANETâ€, IEEE Computer Society, 2016, pp. 212-219.