Please use this identifier to cite or link to this item:
http://dspace2020.uniten.edu.my:8080/handle/123456789/9067
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jassim, H.Sh. | |
dc.contributor.author | Yussof, S. | |
dc.contributor.author | Kiong, T.S. | |
dc.contributor.author | Koh, S.P. | |
dc.contributor.author | Ismail, R. | |
dc.date.accessioned | 2018-02-21T04:53:21Z | - |
dc.date.available | 2018-02-21T04:53:21Z | - |
dc.date.issued | 2009 | |
dc.identifier.uri | http://dspace.uniten.edu.my/jspui/handle/123456789/9067 | - |
dc.description.abstract | A mobile ad-hoc network (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. Nodes can join and leave the network at anytime and are free to move randomly and organize themselves arbitrarily. Due to this nature of MANET, it is possible that there could be some malicious and selfish nodes that try compromise the routing protocol functionality and makes MANET vulnerable to security attacks. In this paper, we present a security-enhanced AODV (Ad hoc On-demand Distance Vector Routing) routing protocol called R-AODV (Reliant Ad hoc On-demand Distance Vector Routing). The implementation of this work is done by modified a trust mechanism known as direct and recommendations trust model and then incorporating it inside AODV which will allow AODV to not just find the shortest path, but instead to find a short path that can be trusted. This enhances security by ensuring that data does not go through malicious nodes that have been known to misbehave. The R-AODV protocol has been implemented and simulated on NS-2. Based on the simulation result, it can be shown that R-AODV does provide a more reliable data transfer compared to the normal AODV if there are malicious nodes in the MANET. ©2009 IEEE. | |
dc.title | A routing protocol based on trusted and shortest path selection for mobile ad hoc network | |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
Appears in Collections: | CCI Scholarly Publication |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.