A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 1

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

A mobile ad hoc network (MANET) is formed with wireless mobile devices (nodes) without the need for existing network infrastructure. Security design in MANET (Mobile advoc network) is complicated because of its features including lack of infrastructure, mobility of nodes; dynamic topology and open wireless medium. Due to this MANET suffer from many security vulnerability. To enhance the security, it is very important to rate the other node which is trustworthy. Hence a unified trust management security scheme is used. In trust management security scheme, the trust model has two components: direct observation and indirect observation. In direct observation, trust value is calculated from an observer node to observed node. On the other hand, indirect observation is also referred as secondhand information which is obtained from neighbor nodes of the observer node; the trust value is calculated between them. By combining these two components in the trust model, a more accurate trust value is obtained. This will help to improve throughput and packet delivery ratio in the network.

Keywords: MANETs, Security, Trust Management, uncertain reasoning

Edition: Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

Share this Article

How to Cite this Article?

Rajshree Ambatkar, Purnima Selokar, "A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14691, Volume 3 Issue 12, December 2014, 1380 - 1382

Enter Your Email Address




Similar Articles with Keyword 'MANETs'

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Trust Management'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1727 - 1731

Design of Secure, Reliable and Lightweight Communication in Trusted Wireless Sensor Network

Pradnya S. Kulkarni, Dr. Aarti Dixit

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1402 - 1405

TaaS: A Framework for Trust Management in Cloud Computing Environments

C. Priya, R. Latha

Share this Article



Top