A Loom for Revealing Selfish and Malicious Node in Cluster Based Adhoc Wireless Networks

被引:0
|
作者
Sonekar, Shrikant V. [1 ]
Kshirsagar, Manali [1 ]
机构
[1] GH Raisoni Coll Engn, Dept CSE, Nagpur, MS, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM) | 2015年
关键词
2ACK; ALOHA; CH; MANET; SN; CSMA;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a day's one of the most interesting areas of research in wireless field is MANET. A Mobile Ad hoc Network (MANET) is a collection of nodes which are capable of communicating with each other through wireless links either directly or indirectly thorough routers. MANET is useful in so many crucial areas like in military application, disaster area etc. The nodes in the MANET can move anywhere in the network randomly. Due to its dynamic network topology it routing is a difficult task here. In present paper, we will see the method for detecting cluster head and malicious node then discuss how to overcome the problem of energy conservation. In next section the results and final section presents the conclusion and future scope.
引用
收藏
页码:370 / 375
页数:6
相关论文
共 17 条
  • [1] Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
    Sonekar, Shrikant, V
    Pal, Madhuri
    Tote, Milind
    Sawwashere, Supriya
    Zunke, Sonali
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 156 - 161
  • [2] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Asima Ismail
    Rashid Amin
    Wireless Personal Communications, 2019, 108 : 2117 - 2135
  • [3] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Ismail, Asima
    Amin, Rashid
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2117 - 2135
  • [4] Selfish Node Detection IDSM Based Approach Using Individual Master Cluster Node
    Veeraiah, Neenavath
    Krishna, B. T.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 427 - 431
  • [5] An Efficient Cluster-Based Approach to Thwart Wormhole Attack in Adhoc Networks
    Spurthi, Kollu
    Shankar, T. N.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 312 - 316
  • [6] Identifying Malicious Node Using Trust Value in Cluster Based MANET (IMTVCM)
    Annadurai, P.
    Vijayalaksmi, S.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1150 - 1158
  • [7] Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks
    Sonekar, Shrikant V.
    Kshirsagar, Manali M.
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 317 - 328
  • [8] An Inter-Domain Agent Based Secure Authorization and Communication for Mobile Clients in Wireless AdHoc Networks
    Kumar, Neeraj
    Patel, R. B.
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2010, 2 (03) : 34 - 46
  • [9] Fuzzy Extended Krill Herd Optimization with Quantum Bat Algorithm for Cluster Based Routing in Mobile Adhoc Networks
    Srinivas M.
    Ramesh Patnaik M.
    Journal of Applied Science and Engineering, 2022, 25 (04): : 633 - 640
  • [10] Hybrid Leach Based Cluster Head Election in Wireless Sensor Networks
    Guray, Manisha
    Marriwala, Nikhil
    Ahmed, Nafeesh
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 86 - 90