• DocumentCode
    2552268
  • Title

    An approach towards identification of malicious nodes in mobile ad hoc networks

  • Author

    Thakurta, Parag Kumar Guha ; Sett, Sujoy

  • Author_Institution
    Comput. Sci. & Eng., Nat. Inst. of Technol. Durgapur, Durgapur, India
  • fYear
    2015
  • fDate
    19-20 Feb. 2015
  • Firstpage
    1016
  • Lastpage
    1019
  • Abstract
    Mobile nodes depend upon mutual operation to perform data transmission in an ad hoc network. In absence of central controlling authority, the authenticity of individual nodes plays an important role. Nodes depend upon a mutual understanding for deciding the malfunctioning of any member. The reliability of this decision is vital for forwarding data within the network. Before applying any standard routing protocol, an efficient network partitioning between the reliable and malfunctioning is thus necessary. This has been approached in this work. The success rate and fault tolerance of the approach has also been discussed.
  • Keywords
    mobile ad hoc networks; routing protocols; telecommunication network reliability; telecommunication security; central controlling authority; data forwarding; data transmission; decision reliability; efficient network partitioning; fault tolerance; malicious node identification; mobile ad hoc networks; node authenticity; standard routing protocol; Ad hoc networks; Mobile computing; Mobile nodes; Nickel; Reliability; Routing; MANET; accuse; adhoc; attack; malicious; mobile node; reliable; vulnerability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on
  • Conference_Location
    Noida
  • Print_ISBN
    978-1-4799-5990-7
  • Type

    conf

  • DOI
    10.1109/SPIN.2015.7095340
  • Filename
    7095340