MACT - Mobile Anonymous Continuous Trust Based Routing Protocol

Date Added: Dec 2011
Format: PDF

Ad hoc networks, the new paradigm of wireless communication are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. Security problems of ad hoc network can be addressed by the use of anonymity and trust mechanisms. The anonymous networks mask the identification information like traffic flow, network topology, paths from malicious attackers. Ad hoc routing protocols with anonymity measures protect the privacy of nodes and also check the information flow by malicious nodes. Similarly trust plays a very important role for intermediate node selection in adhoc networks.