Trust based Secure Routing in MANET using EAASR
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Mobile ad hoc networks is a system of wireless mobile nodes that can be freely and dynamically self-organized in arbitrary and temporary network topologies without the need of wired or a centralised administration. Mobile ad hoc networks (MANETs) are vulnerable to security threats due to the inherent characteristics of such networks, such as the open wireless medium and dynamic topology. It is difficult to provide trusted and secure communications in adversarial environments, such as battlefields. The adversaries outside a network may deduce the information about the communicating nodes or traffic flows by passive traffic observation, even if the communications are encrypted. The nodes inside the network cannot be always trusted, since a valid node may be captured by rivals and becomes pernicious. As a result, anonymous communications are important for MANETs in adversarial environments, in which the nodes identifications and routes are replaced by random numbers or pseudonyms for protection purpose. Anonymity is defined as the state of being unknown within a set of subjects. The MANETs in adversarial environments, in this the public and group key can be initially deployed in the mobile nodes. It is assumed that there is no online security available when the network is deployed.A key-encrypted onion is used to record a discovered route.Group signature is used to validate the RREQ packet per hop.AASR experiences more cryptographic packet delay. The AASR can be improved by reducing the packet delay for which a unified trust management scheme is added that will enhance the security

Keywords: Anonymous Routing, Authenticated Routing, Onion Routing, Mobile Adhoc Network, Trust Management

Edition: Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Share this Article

How to Cite this Article?

Deepika Mohanan, Sachin Godse, "Trust based Secure Routing in MANET using EAASR", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141466, Volume 3 Issue 11, November 2014, 2359 - 2361

70 PDF Views | 57 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Anonymous Routing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1115 - 1121

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)

Ayeesha Siddiqha, Arshad Khan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1074 - 1077

Location Aware Cluster Based Secured Anonymous Routing for Manet

Nandini S. Patil, Rekha Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 62 - 66

AOMDV- Multipath Routing Protocol in Mobile Networks to Enhance Network Security

G. Siva Brindha, M. Rajeswari

Share this Article

Similar Articles with Keyword 'Authenticated Routing'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 967 - 970

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this Article

Similar Articles with Keyword 'Onion Routing'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 515 - 517

Allowing Genuine Users and Blocking Bad Users in Anonymizing Network: The Nymble

Anand A. Maha, P. B. Kumbarkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 967 - 970

Enhanced Onion Routing Framework for MANETs

Karumuri Ashok Kumar, B. Neelima

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2359 - 2361

Trust based Secure Routing in MANET using EAASR

Deepika Mohanan, Sachin Godse

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 236 - 238

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

Share this Article

Similar Articles with Keyword 'Mobile Adhoc Network'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1353 - 1357

Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks

Manpreet Kaur, Pooja Saini

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1504 - 1508

Secure Data Communication Using DNA based Cryptography in Mobile Adhoc Network

Snehal Javheri, Rahul Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 972 - 976

Geo-Location Based Light Weight Bunching Algorithm for Hetro MANETs

Pidakala Sowmya, Kare Suresh Babu

Share this Article

Similar Articles with Keyword 'Trust Management'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1727 - 1731

Design of Secure, Reliable and Lightweight Communication in Trusted Wireless Sensor Network

Pradnya S. Kulkarni, Dr. Aarti Dixit

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1402 - 1405

TaaS: A Framework for Trust Management in Cloud Computing Environments

C. Priya, R. Latha

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2536 - 2540

Survey on Mobile Cloud Computing

Kamalpreet Kaur, Navpreet Kaur Walia

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2701 - 2704

Review on Self Organized Trust Model for Distributed Systems

Suyog Ashokrao Nagare

Share this Article
Top