A Secured Path Evaluation Algorithm for Ad hoc Network

Authors

  • V. Asaithambi  Department of Computer Science, Govt. Arts College, Nandanam,Tamilnadu, India
  • Dr. N. Rama  Department of Computer Science, Presidency College, Chennai,Tamilnadu, India

Keywords:

RP, TT, DT, IT, IR, Black list.

Abstract

Mobile Ad hoc NETwork (MANET) is a wireless network with mobiles like nodes. The nodes in a MANET should be mutually trusted to each other and cooperate to each other. Then only the network can be said as a reliable network. The reliability of a MANET is depending on the reliability of each and every node in the network. The reliability of a node is evaluated in terms of trust value. In this paper the trust value of a node is calculated and the same is used for all other nodes in the network and also the total trust value of the network is evaluated. An intelligent algorithm is developed to secure the network using the trust value.

References

  1. C. J. Alpert and A. B. Kahng UCLA Computer Science Department, Los  Angeles, CA 90024-1596 : A General Framework for Vertex Orderings, With Applications to  Netlist  Clustering
  2. Danny Z. Chen, Ovidiu Daescu, Xiaobo (Sharon) Hu and Jinhui Xu Journal of Algorithms Volume 49, Issue 1 , October 2003, Pages 13-41 Finding an optimal path without growing the tree
  3. Matti Nykänen and Esko Ukkonen, Department of Computer Science,University of  Helsinki, P.O. Box 26, (Teollisuuskatu 23), 00014, Helsinki  Finland Journal of Algorithms  Volume 42, Issue 1 , January 2002, Pages 41-53 The Exact Path Length Problem.
  4. Daniel K. Blandford Guy E. Blelloch Ian A. Kash, Computer Science Department Carnegie Mellon University, Pittsburgh, PA 15213 fblandford,blelloch,iakg@cs.cmu.edu, An Experimental Analysis of a Compact Graph Representation.
  5. www.cs.uni.edu/~schafer/courses/161/sessions/s09.ppt.
  6. http://www.ugrad.cs.ubc.ca/~cs320/Lectures/cs320lec5.pdf.
  7. http://www.personal.kent.edu/~rmuhamma/Algorithms/algorithm.html.
  8. http://wwwin.cisco.com/cpress/cc/td/cpress/internl/dns/index.htm
  9. Sabih H. Gerez.(1999) John Wiley & Sons, Algorithms for VLSI Design Automation.
  10. N.A. Sherwani. (1999) Tata Mc Hill, Algorithm for VLSI Physical Design Automation.
  11. Ellis Horowitz and Sartaj Sahni, (1999) Tata Mc Hill, Fundamentals of Computer Algorithms.
  12. Matt Curtin (1997) Kent Information Services, Introduction to Network  Security.
  13. S. Anuradha, G.Raghu Ram, K.E.Sreenivasa murthy, V.Raghunath Reddy and D.R.Srinivas (2009) International Journal of Recent Trends in Engineering, DB Routing algorithm.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
V. Asaithambi, Dr. N. Rama, " A Secured Path Evaluation Algorithm for Ad hoc Network , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 6, pp.992-994, September-October-2017.