Title :
Stopping communication of malicious nodes in MANETs using authorized tokens
Author :
Chandrakant, N. ; Joshi, Swati P. ; Shenoy, P. Deepa ; Venugopal, K.R. ; Patnaik, L.M.
Author_Institution :
Dept. of Comput. Sci. & Eng., Bangalore Univ., Bangalore, India
Abstract :
A rapid increase of wireless networks and mobile computing applications has changed the landscape of network security. A MANET is more susceptible to the attacks than wired network. As a result, attacks with malicious intent have been and will be devised to take advantage of these vulnerabilities and to cripple the MANET operation. Hence we need to search for new architecture and mechanisms to protect the wireless networks and mobile computing applications. In this paper, we examine the nodes that come under the vicinity of base node and members of the network and communication is provided to genuine nodes only. It is found that the proposed algorithm is a effective algorithm for security in MANETs.
Keywords :
mobile ad hoc networks; mobile computing; security of data; MANET; authorized tokens; malicious nodes; mobile ad hoc network; mobile computing applications; network security; stopping communication; wireless networks; Authentication; Computer architecture; Markov processes; Mobile ad hoc networks; Mobile computing;
Conference_Titel :
Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on
Conference_Location :
Solan
Print_ISBN :
978-1-4244-7675-6
DOI :
10.1109/PDGC.2010.5679892