Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1746
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rupasinghe, L | - |
dc.contributor.author | Nawarathna, C | - |
dc.contributor.author | Niroshan, M. A. J | - |
dc.contributor.author | Kodithuwakku, K. A. H | - |
dc.contributor.author | Kularathna, M. A. S. H | - |
dc.contributor.author | Liyanage, S. C. G | - |
dc.date.accessioned | 2022-03-22T10:35:28Z | - |
dc.date.available | 2022-03-22T10:35:28Z | - |
dc.date.issued | 2018-12-21 | - |
dc.identifier.citation | L. Rupasinghe, C. Nawarathna, M. A. J. Niroshan, K. A. H. Kodithuwakku, M. A. S. H. Kularathna and S. C. G. Liyanage, "Trustworthy MANET Routing ESTAODV Implementation," 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), 2018, pp. 1-6, doi: 10.1109/ICIAFS.2018.8913370. | en_US |
dc.identifier.issn | 2151-1810 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1746 | - |
dc.description.abstract | Mobile Ad hoc networks (MANETs) are a collection of mobile nodes which can move randomly and communicate with each other wirelessly with a dynamic topology. Frequent topological changes are happened in the network because of this dynamic nature. MANETs are popularly used for unmanned systems and networks where telecommunication is absent. Providing security in Mobile Ad hoc Network has become a crucial problem due to the unpredictable motions of misbehaving network nodes. Therefore, a security mechanism is required to distinguish between trustworthy and malicious nodes. Secured routing has become the most active research area in the MANET field due to these challenges and the significances. In this article, a trust-based MANET routing model is proposed to detect misbehaving nodes over Ad hoc On-Demand Distance Vector (AODV) routing protocol. Trust is calculated based on the previous individual experiences and the recommendations of other neighbor nodes. Trust Recommendation Request (TRR) protocol which allows nodes to exchange recommendations regarding their neighbors is introduced in this proposed model. In order to identify malicious nodes, nodes are categorized into trust levels. After detecting malicious nodes, they will be isolated from the network and broadcasted to their neighbor nodes. As a result, network nodes will be able to use the most secure route for packet transmission instead of the shortest path. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS);Pages 1-6 | - |
dc.subject | Trustworthy | en_US |
dc.subject | MANET Routing | en_US |
dc.subject | ESTAODV | en_US |
dc.subject | Implementation | en_US |
dc.title | Trustworthy MANET routing ESTAODV implementation | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICIAFS.2018.8913370 | en_US |
Appears in Collections: | Department of Computer Systems Engineering-Scopes Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Trustworthy_MANET_Routing_ESTAODV_Implementation.pdf Until 2050-12-31 | 608.38 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.