National Conference on Communication Technologies & its impact on Next Generation Computing 2012 |
Foundation of Computer Science USA |
CTNGC - Number 1 |
November 2012 |
Authors: Deepika Kukreja, Umang, B. V. R. Reddy |
7daba11b-223e-402b-bdb5-6eedf343ac1b |
Deepika Kukreja, Umang, B. V. R. Reddy . Trust based Routing using Dominating Set Approach (TRDSA) in Wireless Ad-Hoc Networks. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 1 (November 2012), 16-24.
Secure routing protocols for Mobile Ad hoc Networks (MANETs) have been categorized based on the model used for enforcing security, methodology and information they use to make routing decisions. Some protocols are designed from scratch so as to incorporate security solutions and some are designed to provide security mechanisms into the existing routing protocols like DSDV[1], OLSR[2], AODV[3], DSR[4] etc. Several protocols for secure routing in ad-hoc networks have been proposed. But due to their limitations, there is a need to make them robust and more secure so that they can go well with the demanding requirements of ad hoc networks. We propose and design a new protocol - Trust based Routing using Dominating Set Approach (TRDSA) which overcomes the shortcomings of existing protocols.