scispace - formally typeset
Open AccessJournal ArticleDOI

Cryptographic Versus Trust-based Methods for MANET Routing Security

TLDR
This paper gives the first comparison of SAODV and TAODV, two MANET routing protocols, which address routing security through cryptographic and trust-based means respectively, and provides performance comparisons on actual resource-limited hardware.
About
This article is published in Electronic Notes in Theoretical Computer Science.The article was published on 2008-02-01 and is currently open access. It has received 74 citations till now. The article focuses on the topics: Link-state routing protocol & Interior gateway protocol.

read more

Citations
More filters
Journal ArticleDOI

An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications

TL;DR: An energy-aware trust derivation scheme using game theoretic approach, which manages overhead while maintaining adequate security of WSNs and can achieve both intended security and high efficiency suitable for WSN-based IoT networks is proposed.
Journal ArticleDOI

Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review

TL;DR: In this article, the authors identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges in the Internet of Things (IoT).
Journal ArticleDOI

Light-weight trust-based routing protocol for mobile ad hoc networks

TL;DR: A light-weight trust-based routing protocol that takes care of two kinds of attacks, namely, the blackhole attack and the grey hole attack and is incorporated in any routing protocol.
Journal ArticleDOI

TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks

TL;DR: This paper proposes a trust-aware secure routing framework (TSRF) with the characteristics of lightweight and high ability to resist various attacks and shows with the help of simulations that TSRF can achieve both intended security and high efficiency suitable for WSN-based networks.
Journal ArticleDOI

A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks

TL;DR: The proposed mesh based multipath routing scheme to discover all possible secure paths using secure adjacent position trust verification protocol and better link optimal path find by the Dolphin Echolocation Algorithm for efficient communication in MANET is proposed.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Ad-hoc on-demand distance vector routing

TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Proceedings ArticleDOI

Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers

TL;DR: The modifications address some of the previous objections to the use of Bellman-Ford, related to the poor looping properties of such algorithms in the face of broken links and the resulting time dependent nature of the interconnection topology describing the links between the Mobile hosts.
Related Papers (5)