Identifying Malicious Nodes in Mobile Ad-Hoc Networks using Polynomial Reduction Algorithm

被引:0
作者
Varma, D. Arvind [1 ]
Narayanan, M. [1 ]
机构
[1] Saveetha Univ, Saveetha Sch Engn, Dept Comp Sci & Engn, Madras 602105, Tamil Nadu, India
来源
2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT) | 2016年
关键词
Mobile ad-hoc networks; MANET attacks; Malicious attacks;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Mobile Ad-Hoc Network (MANET) is a dynamic ad hoc network without any fixed infrastructure. Since it is dynamic in nature, it can configure and vary locations by itself, on the move. Since devices in a MANET are autonomous and can move in any direction, they change links with other devices very often. One of the principal challenges in building a MANET is to properly route traffic in order to constantly maintain the information needed by equipping each device. Those kinds of networks can be self-operated or may be linked to the larger internet. They may have one or more - and different - transceivers between nodes, resulting in highly dynamic and autonomous topology. The primary focus is on attacks on MANET, followed by malicious node-detection through a polynomial reduction algorithm. Though scientists have evaluated algorithms for detecting and rectifying malicious nodes, the issue still lingers. As a result of record growth in technology, unknown vulnerabilities are also surfacing. Therefore, to prevent attacks on MANET, it is imperative to propose novel ideas. In this paper, an ns-2 simulator is used to ambush malicious nodes in MANET.
引用
收藏
页码:1179 / 1184
页数:6
相关论文
共 14 条
  • [1] Abdelhaq Maha, 2011, International Journal of New Computer Architectures and their Applications, V1, P534
  • [2] Alattar M., 2012, Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P237, DOI 10.1109/ICDCSW.2012.27
  • [3] Gandhewar N., 2012, 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN 2012), P714, DOI 10.1109/CICN.2012.96
  • [4] Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks
    Glass, Stephen
    Muthukkumurasamy, Vallipuram
    Portmann, Marius
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 530 - +
  • [5] Kandah Farah, 2011, COMP COMM WORKSH INF
  • [6] Kannhavong B., 2006, GLOB TEL C 2006 GLOB, p[1, 5]
  • [7] Kumar Sushant, 2010, P 2010 ACM WORKSH WI, V1
  • [8] Madhurikkha S, 2013, 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), P260, DOI 10.1109/ICICES.2013.6508229
  • [9] Mohil Nitin, 2014, INT J RES ADVENT TEC, V2
  • [10] Sadeghi M., 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN 2012), P301, DOI 10.1109/ICUFN.2012.6261716