Impact of trust management framework on the performance of Path Allegiance Metric based routing protocol in a mobile ad hoc network

Author(s):  
Shirina Samreen
Author(s):  
Shirina Samreen

The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.


Author(s):  
. Harpal ◽  
Gaurav Tejpal ◽  
Sonal Sharma

In this time of instant units, Mobile Ad-hoc Network(MANET) has become an indivisible part for transmission for mobile devices. Therefore, curiosity about study of Mobile Ad-hoc Network has been growing because last several years. In this report we have mentioned some simple routing protocols in MANET like Destination Sequenced Distance Vector, Active Source Redirecting, Temporally-Ordered Redirecting Algorithm and Ad-hoc On Need Distance Vector. Protection is just a serious problem in MANETs because they are infrastructure-less and autonomous. Principal target of writing this report is to handle some simple problems and security considerations in MANET, operation of wormhole strike and acquiring the well-known routing protocol Ad-hoc On Need Distance Vector. This short article will be a great help for the people performing study on real world problems in MANET security.


Sign in / Sign up

Export Citation Format

Share Document