{"title":"在MANET中实现信任感知路由协议的隐私保护:实现与综合","authors":"Shubham Joshi, D. Mishra","doi":"10.2139/ssrn.3735719","DOIUrl":null,"url":null,"abstract":"In wireless sensor networks, establishing a suitable link between the base station and nodes is an essential task. Link establishing is termed as routing which helps the network for reliable and efficient communication. At the same time attacks in the routing schemes to gain access to the data also increases and it significantly affects the network performance. Privacy preservation, encryption, and authentication can't handle some routing attacks. The trust has recently introduced a mechanism to increase safety and better node interaction. The routing mechanism of trust allows you to avoid that nodes are routed by the solution to be credible. Many trust-based Routing Protocol (RP) use routing that accounts for various routing attacks. This study aims to analyze the recent situation and search open research topics by investigating the existing proposed scheme. The paper presents the trust-based system and routing protocols. Eventually, comparative performance analysis of RP is made using the NS-2 network simulator.","PeriodicalId":18268,"journal":{"name":"Materials Engineering eJournal","volume":"11 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Implementing Trust Aware Routing Protocols for Privacy Preservation in MANET: Implementation & Synthesis\",\"authors\":\"Shubham Joshi, D. Mishra\",\"doi\":\"10.2139/ssrn.3735719\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In wireless sensor networks, establishing a suitable link between the base station and nodes is an essential task. Link establishing is termed as routing which helps the network for reliable and efficient communication. At the same time attacks in the routing schemes to gain access to the data also increases and it significantly affects the network performance. Privacy preservation, encryption, and authentication can't handle some routing attacks. The trust has recently introduced a mechanism to increase safety and better node interaction. The routing mechanism of trust allows you to avoid that nodes are routed by the solution to be credible. Many trust-based Routing Protocol (RP) use routing that accounts for various routing attacks. This study aims to analyze the recent situation and search open research topics by investigating the existing proposed scheme. The paper presents the trust-based system and routing protocols. Eventually, comparative performance analysis of RP is made using the NS-2 network simulator.\",\"PeriodicalId\":18268,\"journal\":{\"name\":\"Materials Engineering eJournal\",\"volume\":\"11 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Materials Engineering eJournal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3735719\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Materials Engineering eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3735719","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementing Trust Aware Routing Protocols for Privacy Preservation in MANET: Implementation & Synthesis
In wireless sensor networks, establishing a suitable link between the base station and nodes is an essential task. Link establishing is termed as routing which helps the network for reliable and efficient communication. At the same time attacks in the routing schemes to gain access to the data also increases and it significantly affects the network performance. Privacy preservation, encryption, and authentication can't handle some routing attacks. The trust has recently introduced a mechanism to increase safety and better node interaction. The routing mechanism of trust allows you to avoid that nodes are routed by the solution to be credible. Many trust-based Routing Protocol (RP) use routing that accounts for various routing attacks. This study aims to analyze the recent situation and search open research topics by investigating the existing proposed scheme. The paper presents the trust-based system and routing protocols. Eventually, comparative performance analysis of RP is made using the NS-2 network simulator.