Loading

A Self-Assurance Method Based on Trust Estimation for Secure Routing in MANET
T.Shekar Reddy1, Y.RamaDevi2

1T.Shekar Reddy*, Assistant Professor in Department Computer Science at University College for women(A), Osmania University, Hyderabad, Telangana, India.
2Y.RamaDevi, Ph. D in Computer Science and Engineering from Central University of Hyderabad
Manuscript received on March 15, 2020. | Revised Manuscript received on March 30, 2020. | Manuscript published on April 10, 2020. | PP: 1670-1675 | Volume-9 Issue-6, April 2020. | Retrieval Number: F4380049620/2020©BEIESP | DOI: 10.35940/ijitee.F4380.049620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The improved edition of conventional wireless networks provides a mobile temporary network (MANET), which is extremely appropriate for urgent situations. However, in a similar instance, its infra-low and resource limit creates many challenges in its performance. The growing security risks are probable to take place due to dynamic behavior and the absolute communication cycle which are based on unnoticed nodes, which dropped packets as they desire. Reliable and trusted nodes can reduce communications overhead and many past security schemes have suggested that high turnover can be achieved. Several security studies are expected to be trustworthy and less expensive. This paper aims to propose a self-assured approach (SAA) based on trust assessment for secure routing to secure high-security constancy and security for reliable database delivery based probability assessment. The assessment will be evaluated and the node maintains and identifies among random momentary errors and deliberate malicious actions and asses a node total trustworthiness to have secure and safe communication. 
Keywords: Secure Routing, Trust Estimation, Self-Assurance, MANET.
Scope of the Article: Routing, Switching and Addressing Techniques