Loading

A Trust Based Secured Routing Protocol for Mobile Adhoc Network
E. Edwin Lawrence1, R. Latha2

1E. Edwin Lawrence, Research Scholar, Bharathiar University, Coimbatore, India.
2Dr. R. Latha, Professor & Head, Dept. of Computer Applications, St. Peter’s University, Avadi, Chennai, India.

Manuscript received on September 16, 2019. | Revised Manuscript received on 23 September, 2019. | Manuscript published on October 10, 2019. | PP: 991-995 | Volume-8 Issue-12, October 2019. | Retrieval Number: K13160981119/2019©BEIESP | DOI: 10.35940/ijitee.K1316.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile Ad hoc Network (MANET) is a group of wireless mobile nodes that dynamically creates a network without the support of central management. The mobile hosts of MANET network are not restricted to move freely in any direction and thus linking with any other mobile host can be easily done. Without giving any notification to other hosts in the network, they can be switched on or off. Each mobile host must forward traffic, unrelated to its own use and therefore acts as a router. Because of the mobility of wireless nodes, each node must have the capability of managing an autonomous system, or a routing function without requiring any centralized administration. This mobility and autonomy of the wireless nodes along with the transient nature of the end hosts and intermediate host in a communication path creates a dynamic topology of the network. These mobile hosts are connected in an arbitrary manner and as they are highly mobile, the topology changes take place frequently. The rate of change is based on the velocity of the nodes and the challenge is these devices are small and the available transmission power is limited. In this Trust Based Secured Routing Protocol for MANET (TSRPM), certain changes have been made in the design of secure ad hoc routing protocols. First, a modified Diffie Hellman algorithm is implemented; secondly a trust based model has been developed.
Keywords: Adhoc, Key Exchange, Routing, Secured Transmission.
Scope of the Article: Mobile Adhoc Network