Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-6 of 6 total results
Trust-Based Secure Routing in Mobile Ad Hoc Network Using ...
Abstract. Routing in mobile ad hoc networks (MANETs) is a hectic challenge due to the dynamic nature of the network. The provisional communication links are assured due to the infrastructure-independent capability of MANET, but with no proper centralized monitoring process, which makes routing in MANETs with respect to the security and trust a major issue....
 Security in mobile ad-hoc networks using soft encryption ...
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing Prayag Narula a, Sanjay Kumar Dhurandher a,*, Sudip Misra b, Isaac Woungang c a Division of Information Technology, Netaji Subhas Institute of Technology, University of Delhi, India b Department of Computer Science, Yale University, New Haven, CT, USA c Department of Computer Science, Ryerson University ......
 Design and Implementation of Trust-based Secure Routing ...
in literature [7]. A routing protocol that is based on securing the routing information from unauthorized users is further discussed by Nekkanti et al. [8]. A trust based framework to improve the security and robustness of ad hoc network routing protocols is further implemented by Meka et al. here, a source node selects more trusted...
 Encryption Based Authenticated Routing Protocol for Ad-Hoc ...
Encryption Based Authenticated Routing Protocol for Ad-Hoc Network ... Abstract- The working range of Ad-hoc network will spread in coming future due to dynamic nature. However, there will ... Protocols that use asymmetric cryptography to secure routing in mobile ad hoc networks require the existence of a universally trusted third party (TTP)....
Inclusive Survey of Various Trust based Dynamic Source ...
malicious nodes in mobile ad-hoc network trust based reactive routing protocol are typically used and consequently achieved results are far better. This paper surveys totally different trusted Dynamic source routing protocol, and it is analyzed that the dynamic source routing protocol performs better, whenever the...