Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks
被引:0
作者:
Kukreja, Deepika
论文数: 0引用数: 0
h-index: 0
机构:
GGSIP Univ, USICT, Delhi, IndiaGGSIP Univ, USICT, Delhi, India
Kukreja, Deepika
[1
]
Miglani, Mohit
论文数: 0引用数: 0
h-index: 0
机构:GGSIP Univ, USICT, Delhi, India
Miglani, Mohit
Dhurandher, S. K.
论文数: 0引用数: 0
h-index: 0
机构:GGSIP Univ, USICT, Delhi, India
Dhurandher, S. K.
Reddy, B. V. R.
论文数: 0引用数: 0
h-index: 0
机构:
GGSIP Univ, USICT, Delhi, IndiaGGSIP Univ, USICT, Delhi, India
Reddy, B. V. R.
[1
]
机构:
[1] GGSIP Univ, USICT, Delhi, India
来源:
2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN)
|
2014年
关键词:
security;
penalize;
Mobile Ad Hoc Networks;
secure routing;
routing protocols;
trust;
TRUST;
D O I:
暂无
中图分类号:
TP301 [理论、方法];
学科分类号:
081202 ;
摘要:
Mobile Ad Hoc Networks are the networks that have no base station for constructing the communication among devices. Such a communication network is built by the energy constraint hand held battery powered devices. In this paper, we are proposing a novel method for securing Mobile Ad Hoc Networks. There are many design issues and challenges for Mobile Ad Hoc Networks but the major challenge is the security. Security is a significant challenge that needs to be addressed as member or group authentication, confidentiality, data integrity and access control are strong necessities for such kind of networks. We use Dynamic Source Routing (DSR) as the principal protocol and present a method which selects the most trustworthy path between the source and destination that is free from malicious nodes. The proposed method identifies and punishes the malicious nodes inducing a variety of attacks like: malicious topology change behavior, dropping data packets, dropping control packets and packet modification.
引用
收藏
页码:275 / 280
页数:6
相关论文
共 23 条
[21]
Wang CR, 2005, LECT NOTES COMPUT SC, V3795, P959