A Secured Path Evaluation Algorithm for Ad hoc Network
Keywords:
RP, TT, DT, IT, IR, Black list.Abstract
Mobile Ad hoc NETwork (MANET) is a wireless network with mobiles like nodes. The nodes in a MANET should be mutually trusted to each other and cooperate to each other. Then only the network can be said as a reliable network. The reliability of a MANET is depending on the reliability of each and every node in the network. The reliability of a node is evaluated in terms of trust value. In this paper the trust value of a node is calculated and the same is used for all other nodes in the network and also the total trust value of the network is evaluated. An intelligent algorithm is developed to secure the network using the trust value.
References
- C. J. Alpert and A. B. Kahng UCLA Computer Science Department, Los Angeles, CA 90024-1596 : A General Framework for Vertex Orderings, With Applications to Netlist Clustering
- Danny Z. Chen, Ovidiu Daescu, Xiaobo (Sharon) Hu and Jinhui Xu Journal of Algorithms Volume 49, Issue 1 , October 2003, Pages 13-41 Finding an optimal path without growing the tree
- Matti Nykänen and Esko Ukkonen, Department of Computer Science,University of Helsinki, P.O. Box 26, (Teollisuuskatu 23), 00014, Helsinki Finland Journal of Algorithms Volume 42, Issue 1 , January 2002, Pages 41-53 The Exact Path Length Problem.
- Daniel K. Blandford Guy E. Blelloch Ian A. Kash, Computer Science Department Carnegie Mellon University, Pittsburgh, PA 15213 fblandford,blelloch,iakg@cs.cmu.edu, An Experimental Analysis of a Compact Graph Representation.
- www.cs.uni.edu/~schafer/courses/161/sessions/s09.ppt.
- http://www.ugrad.cs.ubc.ca/~cs320/Lectures/cs320lec5.pdf.
- http://www.personal.kent.edu/~rmuhamma/Algorithms/algorithm.html.
- http://wwwin.cisco.com/cpress/cc/td/cpress/internl/dns/index.htm
- Sabih H. Gerez.(1999) John Wiley & Sons, Algorithms for VLSI Design Automation.
- N.A. Sherwani. (1999) Tata Mc Hill, Algorithm for VLSI Physical Design Automation.
- Ellis Horowitz and Sartaj Sahni, (1999) Tata Mc Hill, Fundamentals of Computer Algorithms.
- Matt Curtin (1997) Kent Information Services, Introduction to Network Security.
- S. Anuradha, G.Raghu Ram, K.E.Sreenivasa murthy, V.Raghunath Reddy and D.R.Srinivas (2009) International Journal of Recent Trends in Engineering, DB Routing algorithm.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.