Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/1746
Title: Trustworthy MANET routing ESTAODV implementation
Authors: Rupasinghe, L
Nawarathna, C
Niroshan, M. A. J
Kodithuwakku, K. A. H
Kularathna, M. A. S. H
Liyanage, S. C. G
Keywords: Trustworthy
MANET Routing
ESTAODV
Implementation
Issue Date: 21-Dec-2018
Publisher: IEEE
Citation: L. Rupasinghe, C. Nawarathna, M. A. J. Niroshan, K. A. H. Kodithuwakku, M. A. S. H. Kularathna and S. C. G. Liyanage, "Trustworthy MANET Routing ESTAODV Implementation," 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), 2018, pp. 1-6, doi: 10.1109/ICIAFS.2018.8913370.
Series/Report no.: 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS);Pages 1-6
Abstract: Mobile Ad hoc networks (MANETs) are a collection of mobile nodes which can move randomly and communicate with each other wirelessly with a dynamic topology. Frequent topological changes are happened in the network because of this dynamic nature. MANETs are popularly used for unmanned systems and networks where telecommunication is absent. Providing security in Mobile Ad hoc Network has become a crucial problem due to the unpredictable motions of misbehaving network nodes. Therefore, a security mechanism is required to distinguish between trustworthy and malicious nodes. Secured routing has become the most active research area in the MANET field due to these challenges and the significances. In this article, a trust-based MANET routing model is proposed to detect misbehaving nodes over Ad hoc On-Demand Distance Vector (AODV) routing protocol. Trust is calculated based on the previous individual experiences and the recommendations of other neighbor nodes. Trust Recommendation Request (TRR) protocol which allows nodes to exchange recommendations regarding their neighbors is introduced in this proposed model. In order to identify malicious nodes, nodes are categorized into trust levels. After detecting malicious nodes, they will be isolated from the network and broadcasted to their neighbor nodes. As a result, network nodes will be able to use the most secure route for packet transmission instead of the shortest path.
URI: http://rda.sliit.lk/handle/123456789/1746
ISSN: 2151-1810
Appears in Collections:Department of Computer Systems Engineering-Scopes
Research Papers - Dept of Computer Systems Engineering
Research Papers - IEEE
Research Papers - SLIIT Staff Publications

Files in This Item:
File Description SizeFormat 
Trustworthy_MANET_Routing_ESTAODV_Implementation.pdf
  Until 2050-12-31
608.38 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.