PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
Analysis of ratings on trust inference in open environments
Performance Evaluation
Trust based secure routing in AODV routing protocol
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In Mobile Ad hoc Networks (MANETs), nodes (mobile devices) are located in a self organized way without any infrastructure forming a temporary network. Each node in a MANET moves independently in any direction, thus the network's topology change rapidly in an unpredictable manner. Wireless nodes try to communicate to the destination node using the intermediate nodes. In such situation, MANET is vulnerable to both internal and external attacks caused by malicious nodes present in the network. In this paper we implemented an approach based upon trust to provide security to Ad hoc On-demand Distance Vector (AODV) protocol, which helps AODV to detect the compromised nodes. This proposed approach is able to detect the compromised nodes and isolates it from the network. The reliability of the trusted AODV routing protocol is evaluated by implementing black hole attack and the performance is calculated in terms of metrics like packet delivery ratio, throughput and average end to end delay. The evaluation of trusted AODV with black hole attack has been done with the help of QualNet 5.0 simulator.