Trust and resource oriented communication scheme in mobile ad hoc networks

Attaining high security in mobile ad hoc networks (or MANETs) is the utmost concern in the present era of wireless ad-hoc communication and efforts are continuously being made by the researchers, in order to provide a feasible solution for the same. Impervious security has to be ensured in MANET...

Full description

Bibliographic Details
Main Authors: Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Yusoff, Siti Hajar, Mir, Roohie Naaz, Sanni, Mistura L.
Format: Book Chapter
Language:English
English
Published: Springer 2018
Subjects:
Online Access:http://irep.iium.edu.my/62114/
http://irep.iium.edu.my/62114/
http://irep.iium.edu.my/62114/
http://irep.iium.edu.my/62114/1/62114_Trust%20and%20resource%20oriented%20communication.pdf
http://irep.iium.edu.my/62114/7/62114_Trust%20and%20resource%20oriented%20communication%20scheme%20in%20mobile%20ad%20hoc%20networks_scopus.pdf
Description
Summary:Attaining high security in mobile ad hoc networks (or MANETs) is the utmost concern in the present era of wireless ad-hoc communication and efforts are continuously being made by the researchers, in order to provide a feasible solution for the same. Impervious security has to be ensured in MANETs because of their involvement in transacting highly sensitive information. However, it has been discerned that during the communication process, the decentralized and dynamic nature of MANETs impedes the security of mobile nodes. This study is an attempt to enhance the security in routing techniques of MANETs by overhauling the existing security system after its critical evaluation. It has been observed that the cryptographic techniques in use prove to be inefficient or fail in some of the current scenarios. Therefore, a non-cryptographic method has been put forward that strengthens the process of authenticating nodes in MANETs by taking into account two factors viz. trust and resource, unlike the conventional ones. On analyzing the performance with respect to throughput, packet delivery ratio, end-to-end delay and computational time, the proposed system proves to be better than the previous standard secure routing scheme.