Malicious packet drop attack over the data plane in a MANET involves malicious nodes dropping the data packets after the route formation. In this paper, a security mechanism has been proposed to detect those nodes which exhibit the malicious behavior by dropping the data packets during the data transmission phase after participating in the route establishment phase without exhibiting any malicious behavior. The detection is done based upon a trust management framework employing the Dempster Shafer Theory to represent the trust. The design of the trust management framework has been covered in earlier works and the current work focuses upon its application for the design of a novel security mechanism. Trust is computed based upon the forwardi...
Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node...
Mobile ad-hoc network (MANET) is used widely today. The work of MANET is totally depends on the coop...
The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an intr...
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a coop...
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynami...
Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense import...
Abstract — Ad hoc networks are a new networking paradigm characterized by a dynamic topology and the...
collection of mobile nodes without any centralized administration. It is easy to deploy malicious no...
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its pac...
The work is proposed based upon Direct Trust Calculation was used in which zero while be discarded a...
Conventional network protocols and its security mechanisms fail to cope with arising challenges in t...
International audienceTrust management is a promising approach to conduct nodes' transactions and es...
A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwardin...
Mobile Ad-hoc Network (MANET) is the network which forms when needed with no existing or fixed infra...
Abstract—Trust can be interpreted as a subjective belief resulting from past interactions that predi...
Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node...
Mobile ad-hoc network (MANET) is used widely today. The work of MANET is totally depends on the coop...
The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an intr...
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a coop...
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynami...
Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense import...
Abstract — Ad hoc networks are a new networking paradigm characterized by a dynamic topology and the...
collection of mobile nodes without any centralized administration. It is easy to deploy malicious no...
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its pac...
The work is proposed based upon Direct Trust Calculation was used in which zero while be discarded a...
Conventional network protocols and its security mechanisms fail to cope with arising challenges in t...
International audienceTrust management is a promising approach to conduct nodes' transactions and es...
A Mobile Adhoc Network is a group of wireless mobile computers in which nodes cooperate by forwardin...
Mobile Ad-hoc Network (MANET) is the network which forms when needed with no existing or fixed infra...
Abstract—Trust can be interpreted as a subjective belief resulting from past interactions that predi...
Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node...
Mobile ad-hoc network (MANET) is used widely today. The work of MANET is totally depends on the coop...
The present paper focused on ad hoc networks with an emphasis on their dynamic nature. After an intr...