A Framework for Detecting Malicious Nodes in Mobile Adhoc Network
نویسندگان
چکیده
منابع مشابه
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing ...
متن کاملDetecting Selfish and Malicious Nodes in MANETs
Mobile ad-hoc networks (MANETs) rely on cooperation of all participating nodes. Thus they are vulnerable to selfish nodes using the net without providing own ressources, as well as malicious nodes attacking the net infrastructure. This paper outlines important attacks and summarizes popular approaches to design secure MANET protocols in order to detect selfish and malicious nodes and to enforce...
متن کاملAn Efficient and Secure System for Detecting Malicious Nodes in Mobile Ad hoc Networks
Recent advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless mobile networking. A Mobile Ad hoc NETwork (MANET) is one of the most important and unique applications among all the contemporary wireless networks. It consists of mobile platforms which are free to move arbitrarily. They do not need a fixed infrastructure and the ne...
متن کاملIntrusion Detection System for Detecting Malicious Nodes in Mobile Ad hoc Networks
A mobile ad hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless links. In this network, a mobile node behaves as a host and a router at the same time. MANETs are highly vulnerable to attacks than wired networks due to their characteristics. Ad hoc network maximize the total network throughput by using all available nodes for routing and ...
متن کاملComparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks
Remotely deployed sensor networks are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We assume that sensor nodes are organized in a hierarchy and use offline neural network based learning technique to predict the data sensed at any node given the d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Science and Technology
سال: 2015
ISSN: 0974-5645,0974-6846
DOI: 10.17485/ijst/2015/v8is2/60285