K.Seshadri Ramana et al. / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 02, 2010, 259-263 T rust Based Security Routing in Mobile Adhoc Networks K.Seshadri Ramana Dr. A.A. Chari Prof. N.Kasiviswanth Associate Professor of Dept of MCA Professor Dept of OR&SQC Head Of the Department of CSE G.Pulla Reddy Engineering College Rayalaseema University G.Pulla Reddy Engineering College Kurnool-518007 Kurnool-518007 Kurnool-518007 A.P., India. A.P., India A.P., India Abstract: Ad hoc networks are widely used in military and other scientific areas. With nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own an fixed infrastructure. It also has a certain number of characteristics which make the security difficult. Routing is always the most significant part for any networks. One way is to transplant ordinary mechanisms in common networks with some improvement while the other way is to find some other factors such as trust to achieve the objective. This paper gives an overview about trust in MANETs and current research in trust based routing. Key Words: Ad hoc Networks, Trust path 1. Introduction Mobile Ad hoc Networks are self-organized, temporal networks which consist of a set of wireless nodes. The nodes can move in an arbitrary manner and work as its own opinions[7. They may join or leave the network without no restrictions. Therefore, Ad hoc networks’ topologies are dynamic and costly to maintain. Furthermore, wireless channels make the routing and message transmission much more challenging. Nodes of these networks can function as routers that discover and maintain routes to other nodes as well as end-users. They will rely other nodes to relay the messages, which are exposed in an open dangerous situation for any intermediate nodes are able to destroy the integrity or choose as their like to deal with the messages. Last but not least, nodes in ad hoc networks have only limited resource, i.e. Battery power, bandwidth and cpu power. They are usually embedded systems which are produced for certain fixed tasks. The situation in ordinary networks such as Internet is totally different. There fixed topology of a tremendous number of nodes which are s pre- configured the connections. The routing service is provided by certain Organizations with authority. The users trust them to pass the messages. Moreover, entities in such networks are powerful and have enough Computational ability. Therefore complicated cryptographic mechanisms can be deployed. And Public Key Infrastructure (PKI) is easily to constructed. Therefore, it is impossible to transplant the common routing protocols and security infrastructure to MANETs due to above reasons. Trust is recently introduced to solve this problem and used in existing protocols for ad hoc networks to improve security. The rest of this report will be organized as follows: Section 2 will give an overview about the outing protocols in MANETs and Trust definition and mechanisms will be proposed in Section 3. In section 4, two routing protocols in research will be presented. Lastly, my preliminary idea to solve certain problems will be discussed. 2. Routing Protocols in MANETs Existing routing protocols can be classified into mainly two types- proactive routing protocols and reactive routing protocols [7]. Proactive routing protocols such as Destination-Sequenced Distance- Vector Routing (DSDV)[5] maintain routing information all the time and always update the routes by broadcasting update messages. Due to the information exchange overhead, especially in volatile environment, proactive routing protocols are not suitable for ad hoc networks [7]. However, reactive routing is started only if there is a demand to reach another node. Currently, there are two widely used reactive protocols- Ad-hoc On- Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) which will be ISSN : 0975-3397 259