International Journal of Computer Applications
An ad-hoc network is a set of mobile nodes in which it is required that each node performs cooperatively and a node is called cooperative when it transfers data correctly to another node in a wireless network. But due to openness in ad-hoc network, it is vulnerable to various kinds of attack from malicious nodes. Various routing protocol recently have been projected to perform secure routing. For the identification of malicious nodes in mobile ad-hoc network trust based reactive routing protocol are typically used and consequently achieved results are far better.