NCTS-DCR: Node Centric Trust based Secure Dynamic Source Routing Protocol
نویسندگان
چکیده
An ad hoc network comprises of few particular connections which collectively collaborate to assist other connections to converse with its associates with the assistance of direct wireless broadcasting. Routing issue in ad hoc broadcasting revised routing problem in a unfavorable situations taking into assumption a secure surrounding. A Node Centric Trust based Secure Dynamic Source Routing (NCTS-DSR) standard is recommended which is built on a imprudent line of attack named dynamic source routing (DSR).
منابع مشابه
A New Framework for Secure Routing in VANET
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
متن کاملEvolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol
The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...
متن کاملDesign and Implementation of Trust-based Secure Routing Protocol for MANETs
A mobile ad hoc network (MANET) consists of independent nodes wherein the system has to work without any set infrastructure in place. Network performance depends upon efficient transmission of packets between nodes. However, dynamic nature of nodes makes secure transmission of packets difficult. In this paper, a Trust-based Secure Routing Protocol for MANETs (TBSRPM) has been proposed in order ...
متن کاملSecured Dynamic Source Routing Protocol for Mobile Sensor Networks
-Sensor networks consist of large number of nodes with limited energy, computation and transmission power. Each node in the network helps every other node by forwarding their packets to reach the destination .Since these nodes operate in a physically insecure environment; they are vulnerable to different types of attacks such as sinkhole and wormhole. These attacks can inject malicious packets ...
متن کاملPoster Abstract Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-Aware Sensor Networks
In data-centric sensor networks, where data processing and transfer are oblivious to node IDs, conventional node-based security models are not suitable. We introduce the novel concept of secure locations to address non-cooperative and malicious behavior in location-aware sensor networks. Our architecture also introduces a scalable trust-based routing protocol (TRANS) to track, update and route ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016