CFP last date
20 May 2024
Reseach Article

Inclusive Survey of Various Trust based Dynamic Source Routing Protocol for Mobile Ad-hoc Network

by Priya Kautoo, Piyush Kumar Shukla, Sanjay Silakari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 4
Year of Publication: 2014
Authors: Priya Kautoo, Piyush Kumar Shukla, Sanjay Silakari
10.5120/16201-1848

Priya Kautoo, Piyush Kumar Shukla, Sanjay Silakari . Inclusive Survey of Various Trust based Dynamic Source Routing Protocol for Mobile Ad-hoc Network. International Journal of Computer Applications. 93, 4 ( May 2014), 7-12. DOI=10.5120/16201-1848

@article{ 10.5120/16201-1848,
author = { Priya Kautoo, Piyush Kumar Shukla, Sanjay Silakari },
title = { Inclusive Survey of Various Trust based Dynamic Source Routing Protocol for Mobile Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 4 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number4/16201-1848/ },
doi = { 10.5120/16201-1848 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:55.853707+05:30
%A Priya Kautoo
%A Piyush Kumar Shukla
%A Sanjay Silakari
%T Inclusive Survey of Various Trust based Dynamic Source Routing Protocol for Mobile Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 4
%P 7-12
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An ad-hoc network is a set of mobile nodes in which it is required that each node performs cooperatively and a node is called cooperative when it transfers data correctly to another node in a wireless network. But due to openness in ad-hoc network, it is vulnerable to various kinds of attack from malicious nodes. Various routing protocol recently have been projected to perform secure routing. For the identification of malicious nodes in mobile ad-hoc network trust based reactive routing protocol are typically used and consequently achieved results are far better. This paper surveys totally different trusted Dynamic source routing protocol, and it is analyzed that the dynamic source routing protocol performs better, whenever the thought of trust being placed in the straightforward dynamic source routing protocol.

References
  1. D. V. Viswacheda, M. S. Arifianto and L. Barukang, "Architectural Infrastructural Issues of Mobile Ad hocNetwork Communications For Mobile Telemedicine System, "4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March, 2007, pp. 22-29.
  2. Anuj Joshi1, PallaviSrivastava and Poonam Singh "Security Threats in Mobile Ad Hoc Network" 2010 S-JPSET,:, Vol. 1, Issue 2, ISSN: 2229-7111.
  3. Mohammad Wazid, Rajesh Kumar Singh, R. H. Goudar "A Survey of AttacksHappenedatDifferentLayers of Mobile Ad-Hoc Network &SomeAvailableDetection Techniques" Proceedingspublished by International Journal of Computer Applications® (IJCA) International Conference on Computer Communication and Networks CSI- COMNET-2011.
  4. Mrs. KritikaTaneja, Dr. S. S. TYAGI, "security issue on aodvroutingprotocolsufferingfromblackholeattack"International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 1, Issue 7, September 2012.
  5. Azzedine Boukerche, BegumhanTurgut, NevinAydin, Mohammad Z. Ahmad, LadislauBölöniDamlaTurgut "Routingprotocols in ad-hoc networks: A survey," Elsevier Computer Networks 55 (2011) 3032–3080.
  6. Nikola MilanovicMiroslawMalek, Anthony Davidson, VeljkoMilutinovic "Routing and Security in Mobile Ad Hoc Networks" Published by the IEEE Computer Society 2004.
  7. Asad Amir Pirzada, AmitavaDatta, Member, Chris McDonald "TrustworthyRoutingwith the AODV Protocol"Published by the IEEE Computer Society 2004.
  8. X. Li Z. Jia P. Zhang R. Zhang H. Wang "Trust-based on-demandmultipathrouting in mobile ad hoc networks" Published by The Institution of Engineering and Technology 2010.
  9. Hui Xia, ZhipingJia, Lei Ju, XinLi, Edwin H. -M. Sha"Impact of trust models on-demand multi-pathrouting in mobile ad-hoc networks"Computer Communications 36 (2013) 1078–1093.
  10. K. Garg, M. Misra "Trust Based Multi Path DSR Protocol," International Conference on Availability, Reliability and Security 2010.
  11. D. Johnson, D. Maltz, "Dynamic source routing in ad hoc wireless networks," in: I. Tomasz, K. Hank (Ends. ), Mobile Computing, first ed. , Kluwer AcademicPress, 1996, pp. 153–181.
  12. Surya Kant, Dr. KrishanKumar "Performance Analysis Of Dynamic Source Routing Protocol In Wireless Mobile Ad Hoc Network" International Journal of Engineering Research&Technology (IJERT) Vol. 1 Issue 10, December- 2012 ISSN: 2278-0181.
  13. Asad Amir Pirzada, AmitavaDatta, "A Trust Model BasedRouting Protocol for Secure Ad Hoc Networks" Member IEEE, Chris McDonald 2004.
  14. S. Marti, T. J. Giuli, K. Lai, M. Baker, "Mitigatingroutingmisbehavior in mobile ad-hoc networks," Mobile Computing and Networking (2000) 255–265.
  15. S. Buchegger and J. -Y. Le Boudec, "Performance analysis of theconfidantprotocol," in MobiHoc '02: Proceedings of the 3rd ACMinternational symposium on Mobile ad hoc networking &computing. New York, York, NY, USA: ACM, 2002, pp. 226–236.
  16. Sonja Buchegger and JeanYves Le Boudec "Performance Analysis of the CONFIDANT Protocol(Cooperation Of Nodes: Fairness In Dynamic Ad-hocNetworks)" EPFL Lausanne, Switzerland. June 2002.
  17. CHENG Yong, HUANG Chuanhe, SHI Wenming "TrustedDynamic Source Routing Protocol" Published by the IEEE Computer Society 2007, 1623-1636.
  18. Asad Amir Pirzada *, AmitavaDatta, Chris McDonald "Incorporating trust and reputation in the DSR protocol for dependablerouting" Computer Communications 29 (2006) 2806–2821
  19. H. Xia,Z. Jia,L. Ju,Y. Zhu, "Trust management model for mobile ad-hoc network based on analytichierarchyprocess and fuzzytheory"Published in IET Wireless Sensor systems2011.
  20. Hui Xia, Zhipingjia, Xin Li, Lei ju "Trust Prediction and Trust-based source routing in mobile ad hoc networks" Computer Communications 2012
  21. . RaihanaFerdous, VallipuramMuthukkumarasamy, Abdul Sattar "Trust Formalization in Mobile Ad-Hoc Networks" 2010 IEEE 24th International Conferenceon Advanced Information Networking and Applications Workshops 351-356.
  22. Asad Amir Pirzada, Chris McDonald "Trusted Route Discoverywith TORA Protocol" Published by IEEE 2004.
Index Terms

Computer Science
Information Sciences

Keywords

DSR Malicious Prediction Reliability Trust.