Cross layer approach to detect malicious node inMANET Vidya N. Patila and S.A.Thorata

Authors

  • Vidya N. Patil Dept. of Computer Science and Engineering, Rajarambapu Institute of Technology, Rajaramnagar, India Author
  • S.A. Thorat Dept. of Computer Science and Engineering, Rajarambapu Institute of Technology, Rajaramnagar, India Author

Keywords:

Trust, Trust parameters, Trust metrics.

Abstract

Mobile Ad hoc NETworks (MANET) are the wireless networks of mobile computing devices without any support of a fixed infrastructure. Routing in MANET is based on mutual support of nodes in the network. But some nodes from the network acts maliciously, so the routing in network collapses. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating nodes and the underlying networking systems without presenting any definite scheme for trust establishment. For defining trustworthiness of the nodes different trust parameters are used by different authors in the literature. In order to calculate more accurate trust value we analyze these different parameters from network as well as MAC layer of protocol stack. Furthermore we also assign some weights to these parameters.

References

Downloads

Published

2013-09-30

Issue

Section

Articles

How to Cite

Cross layer approach to detect malicious node inMANET Vidya N. Patila and S.A.Thorata. (2013). International Journal of Current Engineering and Technology, 1(1.Special Issue), 244-248. https://ijcet.evegenis.org/index.php/ijcet/article/view/3837