Predicting Malicious Node Behavior in Wireless Network Using DSR Protocol and Network Metrics
نویسندگان
چکیده
This paper describes a set of network metrics are helpful to predict behavior malicious node in wireless network. The Network and internet is the device which multiple people can communicate with each other through wired or media. Nowadays, Internet Things, Mobile, vehicular, ad hoc networks all merge into one shared These often used send receive confidential data information. unauthorized misuse these secrete With rise rogue nodes, performance will suffer. A cause variations including packet dropping percentage, throughput, latency, energy consumption, average queue duration. identify node.
منابع مشابه
Detection of Selfish and Malicious Node in Wireless Mesh Network Using Pana Protocol
Wireless Mesh Network is one of emerging technology of the next generation networks. All the routing protocols in WMNs assume all nodes to be co-operative in forwarding each other’s packets. However, a node might try to save its energy by dropping others packet. The proposed mesh network is divided into clusters which reduce the traffic congestion to the gateway. Each cluster has cluster head w...
متن کاملGeographic and Clustering Routing for Energy Saving in Wireless Sensor Network with Pair of Node Groups
Recently, wireless sensor network (WSN) is the popular scope of research. It uses too many applications such as military and non-military. WSN is a base of the Internet of Things (IoT), pervasive computing. It consists of many nodes which are deployed in a specific filed for sense and forward data to the destination node. Routing in WSN is a very important issue because of the limitation of the...
متن کاملMalicious Node Detection Using Confidence Level Evaluation in a Grid-Based Wireless Sensor Network
In this paper, we present a malicious node detection scheme using confidence-level evaluation in a grid-based wireless sensor network. The sensor field is divided into square grids, where sensor nodes in each grid form a cluster with a cluster head. Each cluster head maintains the confidence levels of its member nodes based on their readings and reflects them in decision-making. Two thresholds ...
متن کاملNode Verification in Wireless Network
Proof of user identity on network is just like challenge for current scenario. Node verification is the vital procedure for wireless communication. We proposed a verification technique that use hash code for verification and also proposed 2D cryptography technique to maintain data integrity and confidentiality during transmission.
متن کاملTopology Control in Wireless Sensor Network using Fuzzy Logic
Network sensors consist of sensor nodes in which every node covers a limited area. The most common use ofthese networks is in unreachable fields.Sink is a node that collects data from other nodes.One of the main challenges in these networks is the limitation of nodes battery (power supply). Therefore, the use oftopology control is required to decrease power consumption and increase network acce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Communication and Informatics
سال: 2022
ISSN: ['2582-2713']
DOI: https://doi.org/10.34256/ijcci2211