Reference Hub1
A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network: Reliable Trust Management Framework of MANET

A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network: Reliable Trust Management Framework of MANET

J. Kaur, S. Kaur
Copyright: © 2019 |Volume: 15 |Issue: 2 |Pages: 20
ISSN: 1548-0631|EISSN: 1548-064X|EISBN13: 9781522564270|DOI: 10.4018/IJBDCN.2019070103
Cite Article Cite Article

MLA

Kaur, J., and S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network: Reliable Trust Management Framework of MANET." IJBDCN vol.15, no.2 2019: pp.35-54. http://doi.org/10.4018/IJBDCN.2019070103

APA

Kaur, J. & Kaur, S. (2019). A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network: Reliable Trust Management Framework of MANET. International Journal of Business Data Communications and Networking (IJBDCN), 15(2), 35-54. http://doi.org/10.4018/IJBDCN.2019070103

Chicago

Kaur, J., and S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network: Reliable Trust Management Framework of MANET," International Journal of Business Data Communications and Networking (IJBDCN) 15, no.2: 35-54. http://doi.org/10.4018/IJBDCN.2019070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the base station. A trust-based model in MANET estimates and sets up trust relationship among objectives. Trust-based routing is utilized to keep away data from different attackers like a wormhole, DOS, black-hole, selfish attack and so forth. Trust can be executed in different steps like reputation, subjective rationale and from the supposition of the neighboring node. A trust estimation approach not just watches the behavior of neighbor nodes, additionally it screens the transmission of the information packet in the identification of the route for exact estimation of trust value. A survey is carried out to find some of the limitations behind the existing works which has been done by the researchers to implement various approaches thus to build the trust management framework. Through the survey, it is observed that existing works focused only on the authenticated transmission of the message, how it transmits packets to the destination node securely using a trust-based scheme. And also, it is observed that the routing approach only focused on the key management issues. Certain limitation observed in the implemented approaches of existing work loses the reliability of framework. Thus, to withstand these issues it is necessary to establish a reliable security framework that protects the information exchanged among the users in a network while detecting various misbehaving attacks among the users. Confidentiality, as well as the integrity of information, can be secured by combining context-aware access control with trust management. The performance parameters should be evaluated with the previous works packet delivery ratio, packet drop, detection accuracy, number of false positives, and overhead.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.