Submit Paper

Article Processing Fee

Pay Online

           

Crossref logo

  DOI Prefix   10.20431


 

International Journal of Research Studies in Computer Science and Engineering
Volume 1, Issue 4, 2014, Page No: 63-74

Knowledge Based Trust for Secure Routing Process in Mobile Ad-hoc Networks

K.S.Charumathi1, Dr. Madhumita Chatterjee2

1.M.E. Student, PIIT/Mumbai University Mumbai, Maharashtra, India.
2.CSE department, PIIT/Mumbai University Mumbai, Maharashtra, India.

Citation : K.S.Charumathi, Dr. Madhumita Chatterjee, Knowledge Based Trust for Secure Routing Process in Mobile Ad-hoc Networks International Journal of Research Studies in Computer Science and Engineering 2014, 1(4) : 63-74

Abstract

In recent years, there has been a huge use of mobile computing devices and those led to the development of ad-hoc networking standards and provide the mobile nodes to set up self-organizing, adaptive, and short-lived networks. A mobile ad hoc network consists of wireless mobile nodes forming a temporary network without the help of centralized infrastructure, and where nodes communicate through multi-hops. Trust should be derived under time-critical conditions, and in a distributed way. Trust management in MANETs is needed when participating nodes establish a network, without any interactions previously, with an acceptable level of trust themselves. Trust system can be used to provide network security services like access control, malicious node detection, secure resource sharing, and authentication. So, evaluate the trust value of the nodes periodically based on trust metrics and computational methods. Trust management and computations are challenging issues in MANETs due to independent movement of nodes and computational complexity constraints. Trust management is a multifunctional control mechanism in which the most important task is to establish trust between nodes who are neighbors and making a routing path. A key concept of this project is to propose a trust based secure routing process scheme in MANETs without using any centralized infrastructure. We designed a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. The proposed scheme minimizes the overhead using transiting packets on the network to update nodes knowledge about other nodes trustworthiness and select a secured routing path based on trust knowledge of nodes.


Download Full paper: Click Here