Trust Evaluation in Mobile Ad-hoc Networks

Trust Evaluation in Mobile Ad-hoc Networks

D.Kalaivani, Dr.V.Valli Mayil

D.Kalaivani, Dr.V.Valli Mayil "Trust Evaluation in Mobile Ad-hoc Networks" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | NCSMAC-16 , September 2016, URL:

Infrastructure-less networks have become popular due to wide availability of wireless devices in everyday life. MANETs are becoming more and more common due to their ease of deployment. Mobile Ad Hoc Network is self-configuring and self-organizing wireless network of autonomous mobile devices without any central control and infrastructure. The absence of any central coordination mechanism and open nature makes the Mobile Ad Hoc Network more vulnerable to security threats. In MANET, there is a high possibility that the intermediate nodes can be malicious and they might be a threat to the security. Wormhole is the most frequently occurring attack in ad hoc networks in which one malicious node tunnels the packets from its location to other defective nodes. In this paper, we have surveyed some existing cluster-based techniques for avoidance and detection of wormhole in MANET.

Wormhole, Packet, Mobile Node, Malicious Node.

Special Issue | NCSMAC-16 , September 2016


pompy wtryskowe|cheap huarache shoes| cheap jordans|cheap jordans|cheap air max| cheap sneaker cheap nfl jerseys|cheap air jordanscheap jordan shoes
cheap wholesale jordans