Abstract
Mobile Ad-hoc Networks or MANETs are mostly found in situations where any fixed facilities are just not available. MANET provides some fundamental responsibilities such as routing, packet forwarding communication and network management etc over self structured network. This specially affects the energy, bandwidth and memory computation requirements. Providing trust in MANET is an additional critical task because of lack of centralized infrastructure. Since during the deployment of MANET nodes that are fresh continue returning and aged ones go from the cluster/network, there is demand for maintaining the record also to provide appropriate certification for the arriving node(s) that are fresh as well as the present node(s) in the network. But due to various types of intrusion threats and attacks it is hard to fully scrutinize any new node so as to allow only safe nodes to get connected with the existing safe
system. In a cluster of large size these trusted node(s) will likely be communicating together, all the while allowing or disallowing entry/communication of the compromised node(s) or trusted model to continue to maintain a stable, secured, trustworthy group of movable nodes. All the reported techniques have been systematically categorized and their strong and weak points have been discussed
Users
Please
log in to take part in the discussion (add own reviews or comments).