International Journal of Advanced Research in Computer Engineering & Technology
The execution and survival of ad hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common assumption in the routing protocols that all nodes are trustworthy and cooperative. However, this naive dependency on intermediate nodes makes the ad hoc networks vulnerable to passive and active attacks by malicious nodes. To enhance security in ad hoc networks, it is important to evaluate the trustworthiness of other nodes without central authorities. A considerable amount of work has been done on trust based routing. Yet there are some issues which are not addressed clearly in the existing papers.