Academic literature on the topic 'Secure MANET routing with trust intrigue'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure MANET routing with trust intrigue.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure MANET routing with trust intrigue"

1

Syed, Salman Ali, and Shahzad Ali. "Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 425. http://dx.doi.org/10.11591/ijece.v12i1.pp425-430.

Full text
Abstract:
Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense importance. In this paper, we propose a new enhanced trust model for securing the MANET using trust-based scheme that uses both blind trust and referential trust. In order to do this, the trust relationship function has to be integrated with the dynamic source routing (DSR) protocol for making the protocol more secure. We thoroughly analyze the DSR protocol and generate the performance matrices for the data pertaining to packets sent, packets received, packets loss, and throughput. We also analyze the outcome attained from the improvised trust establishment scheme by using the three algorithm implementations in NS2 simulator for detecting and preventing various types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Mahendrakar Shaymrao, Swetha, Pushpa Sothenahalli Krishnaraju, Thungamani Mahalingappa, and Manjunath Thimmasandra Narayanappa. "Design and development of anonymous location based routing for mobile ad-hoc network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (June 1, 2022): 2743. http://dx.doi.org/10.11591/ijece.v12i3.pp2743-2755.

Full text
Abstract:
Mobile ad-hoc network (MANET) consists of wireless nodes interacting with each other impulsively over the air. MANET network is dynamic in nature because of which there is high risk in security. In MANET keeping node and routing secure is main task. Many proposed methods have tried to clear this issue but unable to fully resolve. The proposed method has strong secure anonymous location based routing (S2ALBR) method for MANET using optimal partitioning and trust inference model. Here initially partitions of network is done into sectors by using optimal tug of war (OTW) algorithm and compute the trustiness of every node by parameters received signal strength, mobility, path loss and co-operation rate. The process of trust computation is optimized by the optimal decided trust inference (ODTI) model, which provides the trustiness of each node, highest trust owned node is done in each sector and intermediate nodes used for transmission. The proposed method is focusing towards optimization with respect to parameter such as energy, delay, network lifetime, and throughput also above parameter is compared with the existing methods like anonymous location-based efficient routing protocol (ALERT), anonymous location-aided routing in suspicious MANET (ALARM) and authenticated anonymous secure routing (AASR).
APA, Harvard, Vancouver, ISO, and other styles
3

Divya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.

Full text
Abstract:
MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. )e main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2.
APA, Harvard, Vancouver, ISO, and other styles
4

Bharti, Meena, Shaveta Rani, and Paramjeet Singh. "Efficient Cluster Head Selection and Trust Based Routing in MANET." Journal of Physics: Conference Series 2327, no. 1 (August 1, 2022): 012049. http://dx.doi.org/10.1088/1742-6596/2327/1/012049.

Full text
Abstract:
Abstract Mobile Adhoc Network (MANET) faces different security challenges due to its collaborative and open communication behavior and restricted availability of resources. Routing is hard and vulnerabilities issues are regularly exposed to highly dynamic nature and numerous communication breakdowns induced by mobile nodes. Thus, security measures that can minimize the effects of various attacks must be included in the MANET’s routing protocols. Secure communication with optimal energy is a big challenge in such networks. This paper presents a secure optimal routing scheme. The objective of the scheme is to find the most optimal secure path with low energy consumption using the proposed function. This scheme is divided into two algorithms; the first algorithm finds cluster head effectively and the second computes the trust value of each path for secure communication. The trust value is computed using the trust-based scheme using packet forwarding information. On the basis of the trust value, this algorithm detects the malicious nodes and removes them from the network and then the other proposed routing scheme computes the optimal path. Then path with less hop count and minimum energy usage is selected optimally.
APA, Harvard, Vancouver, ISO, and other styles
5

Bhattacherjee, Vandana, Charu Wahi, and Shampa Chakraverty. "A trust-based secure AODV routing scheme for MANET." International Journal of Ad Hoc and Ubiquitous Computing 38, no. 4 (2021): 231. http://dx.doi.org/10.1504/ijahuc.2021.10043587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wahi, Charu, Shampa Chakraverty, and Vandana Bhattacherjee. "A trust-based secure AODV routing scheme for MANET." International Journal of Ad Hoc and Ubiquitous Computing 38, no. 4 (2021): 231. http://dx.doi.org/10.1504/ijahuc.2021.119853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rajkumar, Banoth, and G. Narsimha. "Trust Based Certificate Revocation for Secure Routing in MANET." Procedia Computer Science 92 (2016): 431–41. http://dx.doi.org/10.1016/j.procs.2016.07.334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mohan, Ch Ram, and A. Venugopal Reddy. "T-Whale." International Journal of Artificial Life Research 8, no. 2 (July 2018): 67–79. http://dx.doi.org/10.4018/ijalr.2018070104.

Full text
Abstract:
One of the infrastructureless networks built by various independent mobile nodes is mobile ad hoc network (MANET), which is an emerging technology, requiring a secure routing protocol for data transmission. Accordingly, literature presents various secure routing protocols for MANETs by utilizing trust and data encryption. In this article, a whale optimization algorithm (WOA) is utilized for selecting the optimal secured routing path in the MANET. The WOA algorithm utilizes the trust factor and the distance between the nodes for computing the fitness for the routing path. Overall, the steps involved in the proposed routing algorithm are as follows: i) Measuring the trust and the distance-based metrics for every node; ii) Discovering k-disjoint path; and iii) Determining the optimal path based on the trust and the distance-based metrics. The performance of the trust-based WOA (T-Whale) is analyzed using the metrics, energy, throughput, and packet delivery rate. From the simulation results, it is evident that the T-Whale algorithm has the improved energy, throughput, and PDR values of 27.4520, 0.4, and 0.4, at the simulation time of 10 sec over the conventional trust random search algorithm when the node is under attack.
APA, Harvard, Vancouver, ISO, and other styles
9

Sinha, Ditipriya, Uma Bhattacharya, and Rituparna Chaki. "RSRP: A Robust Secure Routing Protocol in MANET." Foundations of Computing and Decision Sciences 39, no. 2 (May 1, 2014): 129–54. http://dx.doi.org/10.2478/fcds-2014-0008.

Full text
Abstract:
Abstract In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs). This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR), secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
10

graha, Anu, and Krishna veni. "An Efficient and Secure Routing in MANET using Trust Model." International Journal of Engineering Trends and Technology 70, no. 9 (October 31, 2022): 330–36. http://dx.doi.org/10.14445/22315381/ijett-v70i9p232.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secure MANET routing with trust intrigue"

1

Sardar, Mousumi, and Koushik Majumder. "A New Trust Based Secure Routing Scheme in MANET." In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, 321–28. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-02931-3_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "EAER-AODV: Enhanced Trust Model Based on Average Encounter Rate for Secure Routing in MANET." In Advances in Intelligent Systems and Computing, 135–51. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8183-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haridas, S., and A. Rama Prasath. "Trust Aware Secure Routing Model in MANET: Self-improved Particle Swarm Optimization for Optimal Route Selection." In Computer, Communication, and Signal Processing, 193–212. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11633-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Patel, Suchita, Priti Srinivas Sajja, and Samrat Khanna. "Enhancement of Security in AODV Routing Protocol Using Node Trust Path Trust Secure AODV (NTPTSAODV) for Mobile Adhoc Network (MANET)." In Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 2, 99–112. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63645-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ciszkowski, Tomasz, and Zbigniew Kotulski. "Secure Routing with Reputation in MANET." In Handbook of Research on Wireless Security, 449–60. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch028.

Full text
Abstract:
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) significant researchers’ attention, due to its innate capabilities of instant communication in many time and mission critical applications. However, its natural advantages of networking in civilian and military environments make it vulnerable to security threats. Support for anonymity in MANET is orthogonal to a critical security challenge we faced in this chapter. We propose a new anonymous authentication protocol for mobile ad hoc networks enhanced with a distributed reputation system. The main objective is to provide mechanisms concealing a real identity of communicating nodes with an ability of resistance to known attacks. The distributed reputation system is incorporated for a trust management and malicious behaviour detection in the network.
APA, Harvard, Vancouver, ISO, and other styles
6

Sinha, Ditipriya, Uma Bhattacharya, and Rituparna Chaki. "A Novel Secure Routing Protocol in MANET." In Advances in Wireless Technologies and Telecommunication, 293–316. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5170-8.ch011.

Full text
Abstract:
This chapter gives an overview of research works on secure routing protocol and also describes a Novel Secure Routing Protocol RSRP proposed by the authors. The routes, which are free from any malicious node and which belong to the set of disjoint routes between a source destination pair, are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, the most trustworthy and stable route is selected among those secure routes using some criteria of the nodes present in a route (e.g., battery power, mobility, and trust value). In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and highly secure and robust. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR), secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD, depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay, and packet dropping in presence of malicious nodes in the MANET.
APA, Harvard, Vancouver, ISO, and other styles
7

Sarbhukan, Vaishali Vilas, and Lata Ragha. "Mobile Ad Hoc Networks Security Enhancement With Trust Management." In Managing Resources for Futuristic Wireless Networks, 1–27. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-5225-9493-2.ch001.

Full text
Abstract:
The mobility and scalability brought by wireless networks made it possible in many applications. In MANET, discovering the stable, secure, and reliable routes is a challenging research problem due to the open nature of wireless communications. In Zhexiong Wei Routing Trust scheme (ZWRT), Bayesian approach and Dempster Shafer theory is used to evaluate more realistic trust value. Mohamed et al proposed Establishing STAble and Reliable Routes (ESTAR) system in heterogeneous multihop wireless networks. The above existing methods failed to solve the complete problem of information loss in MANETs. There are several other reasons due to which the information may loss in MANETS, such as mobility and congestion of mobile nodes. Therefore, the novel Enhanced Trust-based Secure Routing (ETSR) scheme is presented to deliver stable, reliable, and secure data communication in MANETs. The simulation results demonstrate that ETSR routing protocol improve QoS performance as compared to state-of-the-art techniques.
APA, Harvard, Vancouver, ISO, and other styles
8

Srinivasan, Venkatasubramanian, P. L. Rajarajeswari, and T. Sathis Kumar. "Techniques and Applications of Optimal Cluster Head Selection With Trusted Multipath Routing and MANET Intrusion Detection." In Advances in Multimedia and Interactive Technologies, 162–82. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch013.

Full text
Abstract:
A MANET (mobile ad hoc network) is a self-constituted wireless setup that operates independently of existing infrastructure and centralized control. In various daily uses, such as automotive, military, and other field networks, it is possible to find MANET on wireless systems. In contrast with MANET, a fixed or cable data and computer connectivity system are required for many networks. The WiFi, satellite networking, and smartphone network include fixed infrastructure technology. Moreover, MANET is a dynamic energy and security vulnerable system. The fundamental problem of energy efficiency optimization has been addressed effectively by Routing Protocols (R.P.) among the most extant techniques. This work, therefore, offers an efficient multi-track routing in a MANET-based optimization procedure. The intrusion detection and optimal cluster head (C.H.) selection approach, namely firefly algorithm (FFA) based fuzzy clustering and Random Forest (R.F.), is used to address the energy and security crises in the MANET effectively. The multipath routing is then carried out using secure nodes based on the R.P., Bird swarm with Mayfly algorithm (BS-MFA). The best routes are chosen founded on fitness features such as trust, energy connectivity, and throughput. The approaches are compared using existing techniques and various performance metrics such as energy consumption, Delay, and detection rate.
APA, Harvard, Vancouver, ISO, and other styles
9

Subathra, P., and S. Sivagurunathan. "Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks." In Next Generation Data Communication Technologies, 125–43. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-477-2.ch006.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is a collection of wireless nodes communicating over multi-hop paths without any infrastructure. Nodes must cooperate to provide necessary network functionalities. The security in routing protocols like Dynamic Source Routing (DSR) can be compromised by a “Black Hole” attack. Here, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops them, leading to performance degradation. The situation becomes worse when two or more nodes cooperate and perform the “Cooperative black hole” attack. This chapter proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating the attacking nodes. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio, and false negative probability in comparison with trust and probe based schemes.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure MANET routing with trust intrigue"

1

Banerjee, Arnab, Dipayan Bose, Aniruddha Bhattacharyya, Himadri Nath Saha, and Debika Bhattacharyya. "Administrator and Trust Based Secure Routing in MANET." In 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS). IEEE, 2012. http://dx.doi.org/10.1109/mncapps.2012.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ullah, Zakir, Muhammad Hasan Islam, and Adnan Ahmed Khan. "Issues with trust management and trust based secure routing in MANET." In 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2016. http://dx.doi.org/10.1109/ibcast.2016.7429910.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sardar, Mousumi, and Koushik Majumder. "A Survey on Trust Based Secure Routing in Manet." In Third International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2013. http://dx.doi.org/10.5121/csit.2013.3525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, D. Santhosh, and K. Thirunadana Sikamani. "Efficient and secure trust based Ad Hoc routing in MANET." In 2013 International Conference on Current Trends in Engineering and Technology (ICCTET). IEEE, 2013. http://dx.doi.org/10.1109/icctet.2013.6675961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ramanarayana, K., and Lillykutty Jacob. "Secure Routing in Integrated Mobile Ad hoc Network (MANET)-Internet." In Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007). IEEE, 2007. http://dx.doi.org/10.1109/secperu.2007.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Geetha, S., and G. Geetha Ramani. "Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory." In the Second International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2393216.2393237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prabaharan, S. Beski, and R. Ponnusamy. "Secure and energy efficient MANET routing incorporating trust values using hybrid ACO." In 2016 International Conference on Computer Communication and Informatics. IEEE, 2016. http://dx.doi.org/10.1109/iccci.2016.7479933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Biswas, Suparna, Tanumoy Nag, and Sarmistha Neogy. "Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET." In 2014 Applications and Innovations in Mobile Computing (AIMoC). IEEE, 2014. http://dx.doi.org/10.1109/aimoc.2014.6785535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography