Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Multi-path and Message Trust-Based Secure Routing in Ad Hoc Networks
ACT '09 Proceedings of the 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies
GNDA: Detecting Good Neighbor Nodes in Adhoc Routing Protocol
EAIT '11 Proceedings of the 2011 Second International Conference on Emerging Applications of Information Technology
Journal of Network and Computer Applications
A routing protocol based on trust for MANETs
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In Wireless Ad Hoc Network environment, there are three ways to understand a routing protocol: (i) monitoring, (ii) simulation and (iii) modeling. In this paper, the different trust based secure routing protocols used in wireless ad hoc networks are analyzed, modeled and described by incorporating process flow diagrams. These process flow diagrams represent stepwise work flow activities and actions. It shows the overall flow of control of a process, program or a protocol. This paper focuses on the security aspects of routing by incorporating trust parameter into account and also highlights methodology used in secure routing protocols. Such protocols have been categorized based on the model used for enforcing security, methodology and information for making effective routing decisions. In this paper, we model, discuss and analyze trust based secure ad hoc routing schemes which do not require each network node to work in promiscuous mode. We propose and design a new protocol - Trust based Routing using Dominating Set Approach (TRDSA) which overcomes the shortcomings of existing protocols.