Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks

Provided by: International Journal of Computer Applications
Topic: Mobility
Format: PDF
Secure routing protocols for Mobile Ad-hoc NETworks (MANETs) have been categorized based on the model used for enforcing security, methodology and information they use to make routing decisions. Some protocols are designed from scratch so as to incorporate security solutions and some are designed to provide security mechanisms into the existing routing protocols like DSDV, OLSR, AODV, DSR, etc. Several protocols for secure routing in ad-hoc networks have been proposed. But due to their limitations, there is a need to make them robust and more secure so that they can go well with the demanding requirements of ad-hoc networks.

Find By Topic