Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/1746
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRupasinghe, L-
dc.contributor.authorNawarathna, C-
dc.contributor.authorNiroshan, M. A. J-
dc.contributor.authorKodithuwakku, K. A. H-
dc.contributor.authorKularathna, M. A. S. H-
dc.contributor.authorLiyanage, S. C. G-
dc.date.accessioned2022-03-22T10:35:28Z-
dc.date.available2022-03-22T10:35:28Z-
dc.date.issued2018-12-21-
dc.identifier.citationL. Rupasinghe, C. Nawarathna, M. A. J. Niroshan, K. A. H. Kodithuwakku, M. A. S. H. Kularathna and S. C. G. Liyanage, "Trustworthy MANET Routing ESTAODV Implementation," 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), 2018, pp. 1-6, doi: 10.1109/ICIAFS.2018.8913370.en_US
dc.identifier.issn2151-1810-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/1746-
dc.description.abstractMobile Ad hoc networks (MANETs) are a collection of mobile nodes which can move randomly and communicate with each other wirelessly with a dynamic topology. Frequent topological changes are happened in the network because of this dynamic nature. MANETs are popularly used for unmanned systems and networks where telecommunication is absent. Providing security in Mobile Ad hoc Network has become a crucial problem due to the unpredictable motions of misbehaving network nodes. Therefore, a security mechanism is required to distinguish between trustworthy and malicious nodes. Secured routing has become the most active research area in the MANET field due to these challenges and the significances. In this article, a trust-based MANET routing model is proposed to detect misbehaving nodes over Ad hoc On-Demand Distance Vector (AODV) routing protocol. Trust is calculated based on the previous individual experiences and the recommendations of other neighbor nodes. Trust Recommendation Request (TRR) protocol which allows nodes to exchange recommendations regarding their neighbors is introduced in this proposed model. In order to identify malicious nodes, nodes are categorized into trust levels. After detecting malicious nodes, they will be isolated from the network and broadcasted to their neighbor nodes. As a result, network nodes will be able to use the most secure route for packet transmission instead of the shortest path.en_US
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.ispartofseries2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS);Pages 1-6-
dc.subjectTrustworthyen_US
dc.subjectMANET Routingen_US
dc.subjectESTAODVen_US
dc.subjectImplementationen_US
dc.titleTrustworthy MANET routing ESTAODV implementationen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/ICIAFS.2018.8913370en_US
Appears in Collections:Department of Computer Systems Engineering-Scopes
Research Papers - Dept of Computer Systems Engineering
Research Papers - IEEE
Research Papers - SLIIT Staff Publications

Files in This Item:
File Description SizeFormat 
Trustworthy_MANET_Routing_ESTAODV_Implementation.pdf
  Until 2050-12-31
608.38 kBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.