•In multi hop wireless networks, routing protocol is used to transfer packets between
nodes via intermediate nodes.
•Basically routing protocol is divided into three phases: route discovery, packet
forwarding and route maintenance.
•The route discoveries may incur network-wide flooding of routing requests that can
consume a considerable amount of the network resources such as energy.
•Malicious nodes perform malicious activities like packet dropping, flooding, and
packet delaying etc., to utilize the limited resources of a node.
• Breaking the routes increases the packet delivery latency and may cause network
partitioning resulting in failure of the multi hop communications.
LITERATURE SURVEY
• In each node, the trust factor is updated based on the successful participation of the
other nodes in previous data transmissions. Our protocol is based on the DSR routing
protocol, and is on-demand. In addition, it is a distributed protocol.
• Unlike other protocols, such as the link-state-based ones, each node only has to
maintain topology and trust information about its immediate neighbors and not the
entire network.
These characteristics enhance the scalability and performance of our proposed
algorithm. Also as an ad hoc networks usually include nodes of varying trust levels, it
becomes necessary to distinguish these nodes using the accumulated trust levels for
each node.
•As a result, TRAS becomes more effective and more capable of selecting paths with
higher trust levels.
ARCHITECTURE
CONCLUSION
Hardware Requirements :
Minimum 4 to 5 Physical Machines/Virtual Machines in Network
REFERENCES
[1] Q. He, D. Wu and P. Khosla, "SORI: A Secure and Objective Reputation-based Incentive Scheme for
Ad-hoc Networks," in Wireless Communications and Networking Conference, 2004.
[2] Abusalah, A. Khokhar and M. Guizani, "TARP: Trust Aware Routing Protocol," 2006.
[3] M. A. Ayachi, C. Bidan, T. Abbes and A. Bouhoula, "Misbehavior Detection using Implicit Trust
Relations in the AODV Routing Protocol," in International Conference on Computaional Science and
Engineering, 2009.
[4] S. Hadim, J. Al-Jaroodi and N. Mohammed, Middleware Issues and Approaches for Mobile Ad
Hoc Networks, in proc. of IEEE Consumer Communications and Networking Conference (CCNC
2006), Las Vegas, Nevada, January 2006.
[5] Z. Liu, A.W. Joy and R.A. Thompson, A Dynamic Trust Model for Mobile Ad Hoc Networks, Proc.
of IEEE International Workshop on Future Trends of Distributed Computing Systems, 2010.
[6] C. Wang, X. Yang and Y. Gao, A Routing Protocol Based on Trust for MANETs, Springer, 2005.
THANK YOU