Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks

by   Mohammad Riyaz Belgaum, et al.

Routing protocols are used to transmit the packets from the source to the destination node in mobile ad hoc networks. The intruders seek chance to pierce into the network and becomes a cause of malfunctioning in the network. These protocols are always prone to attacks. During the phases of routing in different types of protocols, each of the attack finds a way to degrade the performance of the routing protocols. The reactive routing protocols DSR and AODV have lot of similar features and so are considered in this study. In order to transmit the packets safely, a secured approach using triple factor has been proposed. This triple factor computes the trust by using the direct information then verifies the reputation by collecting the information from the neighbouring nodes called distributed factor and uses cryptographic algorithm to ensure security. And to ensure that there are routes available to perform the routing process, the reasons for such attacks are studied so as to re-integrate back the nodes in to the network, once it has repented for being malicious before. The availability of routes increases the throughput


page 1

page 2

page 3

page 4


Ideal Node Enquiry Search Algorithm (INESH) in MANETS

The different routing protocols in Mobile Ad hoc Networks take after var...

An enhanced Multipath Strategy in Mobile Ad hoc Routing Protocols

The various routing protocols in Mobile Ad hoc Networks follow different...

Mathematical Modeling of Routes Maintenance and Recovery Procedure for MANETs

Routing is one of the most mysterious issues from the birth of networks ...

Effective usage of random routing on networks of mobile agents

Most existing routing strategies to improve transport efficiency have li...

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed ...

Stability of Adversarial Routing with Feedback

We consider the impact of scheduling disciplines on performance of routi...

An Axiomatic Approach to Routing

Information delivery in a network of agents is a key issue for large, co...