DocumentCode :
2552268
Title :
An approach towards identification of malicious nodes in mobile ad hoc networks
Author :
Thakurta, Parag Kumar Guha ; Sett, Sujoy
Author_Institution :
Comput. Sci. & Eng., Nat. Inst. of Technol. Durgapur, Durgapur, India
fYear :
2015
fDate :
19-20 Feb. 2015
Firstpage :
1016
Lastpage :
1019
Abstract :
Mobile nodes depend upon mutual operation to perform data transmission in an ad hoc network. In absence of central controlling authority, the authenticity of individual nodes plays an important role. Nodes depend upon a mutual understanding for deciding the malfunctioning of any member. The reliability of this decision is vital for forwarding data within the network. Before applying any standard routing protocol, an efficient network partitioning between the reliable and malfunctioning is thus necessary. This has been approached in this work. The success rate and fault tolerance of the approach has also been discussed.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication network reliability; telecommunication security; central controlling authority; data forwarding; data transmission; decision reliability; efficient network partitioning; fault tolerance; malicious node identification; mobile ad hoc networks; node authenticity; standard routing protocol; Ad hoc networks; Mobile computing; Mobile nodes; Nickel; Reliability; Routing; MANET; accuse; adhoc; attack; malicious; mobile node; reliable; vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-5990-7
Type :
conf
DOI :
10.1109/SPIN.2015.7095340
Filename :
7095340
Link To Document :
بازگشت