作者: Deepika Kukreja , Umang Singh , B. V.R. Reddy
关键词: Distributed computing 、 Adaptive quality of service multi-hop routing 、 Computer network 、 Optimized Link State Routing Protocol 、 Ad hoc wireless distribution service 、 Computer science 、 Link-state routing protocol 、 Zone Routing Protocol 、 Destination-Sequenced Distance Vector routing 、 Dynamic Source Routing 、 Wireless Routing Protocol
摘要: In Wireless Ad Hoc Network environment, there are three ways to understand a routing protocol: (i) monitoring, (ii) simulation and (iii) modeling. this paper, the different trust based secure protocols used in wireless ad hoc networks analyzed, modeled described by incorporating process flow diagrams. These diagrams represent stepwise work activities actions. It shows overall of control process, program or protocol. This paper focuses on security aspects parameter into account also highlights methodology protocols. Such have been categorized model for enforcing security, information making effective decisions. we model, discuss analyze schemes which do not require each network node promiscuous mode. We propose design new protocol - Trust Routing using Dominating Set Approach (TRDSA) overcomes shortcomings existing