2010 International Conference on Computational Intelligence and Software Engineering 2010
DOI: 10.1109/wicom.2010.5600904
|View full text |Cite
|
Sign up to set email alerts
|

The Trust-Based MAC - Layer Security Protocol for Mobile Ad Hoc Networks

Abstract: In this paper, we develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…Hence, cross-layer approach comes as better alternative and was found to be adopted by various researchers e.g. Gopinath et al [31], Raja ram [32], and Djahel et al [33].…”
Section: Cross-layer Based Approachmentioning
confidence: 99%
“…Hence, cross-layer approach comes as better alternative and was found to be adopted by various researchers e.g. Gopinath et al [31], Raja ram [32], and Djahel et al [33].…”
Section: Cross-layer Based Approachmentioning
confidence: 99%
“…A.Rajaram et al [12] have developed a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A number of trust building and clusterbased voting schemes have been proposed to enable the sharing and vetting of messages, and data, generated and gathered by IDS systems. Zhang and Lee describe a distributed and collaborative anomaly detection-based IDS for ad hoc networks [2,3]. AODV routing behavior and distributed network monitors for detecting run-time violation of the specifications [4].…”
Section: Related Workmentioning
confidence: 99%