CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Faith based Routing in Mobile Ad Hoc Network

by Rohini Jatana, Rajesh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 143 - Number 1
Year of Publication: 2016
Authors: Rohini Jatana, Rajesh Kumar
10.5120/ijca2016910012

Rohini Jatana, Rajesh Kumar . Faith based Routing in Mobile Ad Hoc Network. International Journal of Computer Applications. 143, 1 ( Jun 2016), 36-40. DOI=10.5120/ijca2016910012

@article{ 10.5120/ijca2016910012,
author = { Rohini Jatana, Rajesh Kumar },
title = { Faith based Routing in Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 143 },
number = { 1 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 36-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume143/number1/25045-2016910012/ },
doi = { 10.5120/ijca2016910012 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:45:13.495903+05:30
%A Rohini Jatana
%A Rajesh Kumar
%T Faith based Routing in Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 143
%N 1
%P 36-40
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is a collection of wireless mobile nodes that work together by forwarding packets for each other to let them to communicate outside the range of direct wireless transmission or with each other. Secure routing protocols are a crucial area towards security of MANET. The routing solutions for conventional networks are not sufficient to work efficiently in Ad Hoc environment. In this work, we have proposed a scheme to select secure route for data forwarding. This technique will avoid interception of messages through black hole nodes. We have compared our results with DSR routing protocol, the results showed that Faith DSR will avoid routing of packets through black hole nodes. The goal of this work is to provide a simple node based trust management scheme for MANET, an understanding of the properties, which should be considered in developing a trust metric and insights on how a trust metric can be customized to meet the requirements and goals of the network trust management scheme. The model is simple, flexible and easy to be implemented. The proposed routing protocol is compared with DSR protocol and the results are analyzed using the MATLAB.

References
  1. P Narayan, V R. Syrotiuk,”Evaluation of the AODV and DSR Routing Protocols Using the MERIT Tool”, In proceeding or ADHOC-NOW 2004, pp25-36.
  2. K.Selvavinayaki, K.K.Shyam Shankar, Dr.E.Karthikeyan “Security Enhanced DSR Protocol to Prevent Black Hole Attacks in MANETs” International Journal of Computer Applications (0975 – 8887) Volume 7– No.11, October 2010.
  3. Li, Xin; Jia, Zhiping; Wang, Haiyang;”Trust-based On-demand Multipath Routing in Mobile Ad Hoc Networks” IET Information Security, 2012 .
  4. Sun, Y., Yu, W. ,Han, Z.,and Liu, K.J.R.:’Information Theoretic Framework of Trust Modeling and Evaluation for AdHoc Networks’, IEEE Journal on Selected Areas in Communications, 2006, 24, (2),pp. 305-317
  5. G. Theodorakopoulos and J. S. Baras, “On trust models and trust evaluation metrics for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 318-328, Feb. 2006.
  6. M. E. G. Moe, B. E. Helvik, and S. J. Knapskog, “TSR: Trust-based Secure MANET Routing using HMMs,” Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, 27-28 Oct. 2008, pp. 83-90.
  7. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. 6th Annual ACM/IEEE Mobile Computing and Networking, Boston, MA, Aug. 2000, pp.255- 265.
  8. J. Sen, P. Chowdhury, and I. Sengupta, “A Distributed Trust Mechanism for Mobile Ad Hoc Networks,” Int’l Symposium on Ad Hoc and Ubiquitous Computing, 20-23 Dec. 2006. Surathkal, India, pp. 62-67.
  9. Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, “Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, Feb. 2006, pp. 305-317.
  10. V. Balakrishnnan, V. Varadharajan, U. K. Tupakula, and P. Lucs, “Trust and Recommendations in Mobile Ad Hoc Networks,” Int’l Conf. on Networking and Services, Athens, Greece, 19-25 June 2007, pp. 64-69.
Index Terms

Computer Science
Information Sciences

Keywords

Manet secure DSR secure routing faith based DSR blackhole