An Attack Proof Trust Model for Secure Path Selection with Data Transmission in MANET: A Survey
R. Lodhi, S. Kumar, and B. Pathik. International Journal of Innovative Science and Modern Engineering (IJISME), 4 (8):
11-13(December 2016)
Abstract
A Mobile Ad-hoc Network (MANET) is a network of mobile nodes which also act as routers and are connected by wireless links. These routers are free to move and organize themselves at random; thus, the network's wireless topology may change rapidly and unpredictably. The dynamic nature of MANETs makes network open to attacks and unreliability. MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANETs is a legitimate challenge. Dynamic source routing set of rules is a functional protocol in wireless mobile ad-hoc network (MANET). Data Safekeeping and detection of malicious node in a MANET is an imperative job in any network. To achieve reliability and availability, routing protocols should be powerful against malicious attacks. This paper provides survey to the attacks while data transmission and finding secure route in MANET.
%0 Journal Article
%1 noauthororeditor
%A Lodhi, Ravi
%A Kumar, Shiv
%A Pathik, Babita
%D 2016
%E Kumar, Dr. Shiv
%J International Journal of Innovative Science and Modern Engineering (IJISME)
%K Ad MANET Network Protocol Routing Wireless attack hoc malicious routing secure trust value.
%N 8
%P 11-13
%T An Attack Proof Trust Model for Secure Path Selection with Data Transmission in MANET: A Survey
%U https://www.ijisme.org/wp-content/uploads/papers/v4i8/G1013094716.pdf
%V 4
%X A Mobile Ad-hoc Network (MANET) is a network of mobile nodes which also act as routers and are connected by wireless links. These routers are free to move and organize themselves at random; thus, the network's wireless topology may change rapidly and unpredictably. The dynamic nature of MANETs makes network open to attacks and unreliability. MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANETs is a legitimate challenge. Dynamic source routing set of rules is a functional protocol in wireless mobile ad-hoc network (MANET). Data Safekeeping and detection of malicious node in a MANET is an imperative job in any network. To achieve reliability and availability, routing protocols should be powerful against malicious attacks. This paper provides survey to the attacks while data transmission and finding secure route in MANET.
@article{noauthororeditor,
abstract = {A Mobile Ad-hoc Network (MANET) is a network of mobile nodes which also act as routers and are connected by wireless links. These routers are free to move and organize themselves at random; thus, the network's wireless topology may change rapidly and unpredictably. The dynamic nature of MANETs makes network open to attacks and unreliability. MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANETs is a legitimate challenge. Dynamic source routing set of rules is a functional protocol in wireless mobile ad-hoc network (MANET). Data Safekeeping and detection of malicious node in a MANET is an imperative job in any network. To achieve reliability and availability, routing protocols should be powerful against malicious attacks. This paper provides survey to the attacks while data transmission and finding secure route in MANET.},
added-at = {2021-09-18T08:40:16.000+0200},
author = {Lodhi, Ravi and Kumar, Shiv and Pathik, Babita},
biburl = {https://www.bibsonomy.org/bibtex/29aeeb5956a4519246b2a42c627695a82/ijisme_beiesp},
editor = {Kumar, Dr. Shiv},
interhash = {9d2a3947e023f080a87f2f721ee367df},
intrahash = {9aeeb5956a4519246b2a42c627695a82},
issn = {2319-6386},
journal = {International Journal of Innovative Science and Modern Engineering (IJISME)},
keywords = {Ad MANET Network Protocol Routing Wireless attack hoc malicious routing secure trust value.},
language = {En},
month = {December},
number = 8,
pages = {11-13},
timestamp = {2021-09-18T08:40:16.000+0200},
title = {An Attack Proof Trust Model for Secure Path Selection with Data Transmission in MANET: A Survey},
url = {https://www.ijisme.org/wp-content/uploads/papers/v4i8/G1013094716.pdf},
volume = 4,
year = 2016
}