EconPapers    
Economics at your fingertips  
 

Analysis of Existing Trust Based Routing Schemes Used in Wireless Network

Kajal S. Patel and Jagdish S. Shah
Additional contact information
Kajal S. Patel: Government Engineering College, Rajkot, India
Jagdish S. Shah: Government Engineering College, Patan, India

International Journal of Information Security and Privacy (IJISP), 2016, vol. 10, issue 2, 26-40

Abstract: Wireless networks are vulnerable to many security attacks as they use wireless media and a node has to depend on unknown intermediate nodes for data transmission. Cryptographic algorithms used for wired network cannot work efficiently in wireless network, as in wireless network nodes are mobile and battery operated. Nodes may also have limited resources available. So, to detect malicious activities on node and improve stability of route while routing in mobile ad hoc network, trust-based routing is used. Communication parameters used in calculating trust value in most of existing trust based protocol (wireless network) are number of successful session or packet forwarded between two nodes, number of packet dropped or delayed, response time, battery life, mobility of node etc. This paper provides analysis of existing trust based routing by surveying current “sate of the art” work in this area. This paper also proposed a new parameter (number of route error message sent by a node) of a wireless node which can affect the network performance and can be used to calculate trust value.

Date: 2016
References: Add references at CitEc
Citations:

Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJISP.2016040103 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:10:y:2016:i:2:p:26-40

Access Statistics for this article

International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh

More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().

 
Page updated 2025-03-19
Handle: RePEc:igg:jisp00:v:10:y:2016:i:2:p:26-40