MACT - Mobile Anonymous Continuous Trust Based Routing Protocol

Ad hoc networks, the new paradigm of wireless communication are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. Security problems of ad hoc network can be addressed by the use of anonymity and trust mechanisms. The anonymous networks mask the identification information like traffic flow, network topology, paths from malicious attackers. Ad hoc routing protocols with anonymity measures protect the privacy of nodes and also check the information flow by malicious nodes. Similarly trust plays a very important role for intermediate node selection in adhoc networks.

Provided by: EuroJournals Topic: Mobility Date Added: Dec 2011 Format: PDF

Find By Topic