Title :
An approach towards identification of malicious nodes in mobile ad hoc networks
Author :
Thakurta, Parag Kumar Guha ; Sett, Sujoy
Author_Institution :
Comput. Sci. & Eng., Nat. Inst. of Technol. Durgapur, Durgapur, India
Abstract :
Mobile nodes depend upon mutual operation to perform data transmission in an ad hoc network. In absence of central controlling authority, the authenticity of individual nodes plays an important role. Nodes depend upon a mutual understanding for deciding the malfunctioning of any member. The reliability of this decision is vital for forwarding data within the network. Before applying any standard routing protocol, an efficient network partitioning between the reliable and malfunctioning is thus necessary. This has been approached in this work. The success rate and fault tolerance of the approach has also been discussed.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication network reliability; telecommunication security; central controlling authority; data forwarding; data transmission; decision reliability; efficient network partitioning; fault tolerance; malicious node identification; mobile ad hoc networks; node authenticity; standard routing protocol; Ad hoc networks; Mobile computing; Mobile nodes; Nickel; Reliability; Routing; MANET; accuse; adhoc; attack; malicious; mobile node; reliable; vulnerability;
Conference_Titel :
Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-5990-7
DOI :
10.1109/SPIN.2015.7095340