DocumentCode
2552268
Title
An approach towards identification of malicious nodes in mobile ad hoc networks
Author
Thakurta, Parag Kumar Guha ; Sett, Sujoy
Author_Institution
Comput. Sci. & Eng., Nat. Inst. of Technol. Durgapur, Durgapur, India
fYear
2015
fDate
19-20 Feb. 2015
Firstpage
1016
Lastpage
1019
Abstract
Mobile nodes depend upon mutual operation to perform data transmission in an ad hoc network. In absence of central controlling authority, the authenticity of individual nodes plays an important role. Nodes depend upon a mutual understanding for deciding the malfunctioning of any member. The reliability of this decision is vital for forwarding data within the network. Before applying any standard routing protocol, an efficient network partitioning between the reliable and malfunctioning is thus necessary. This has been approached in this work. The success rate and fault tolerance of the approach has also been discussed.
Keywords
mobile ad hoc networks; routing protocols; telecommunication network reliability; telecommunication security; central controlling authority; data forwarding; data transmission; decision reliability; efficient network partitioning; fault tolerance; malicious node identification; mobile ad hoc networks; node authenticity; standard routing protocol; Ad hoc networks; Mobile computing; Mobile nodes; Nickel; Reliability; Routing; MANET; accuse; adhoc; attack; malicious; mobile node; reliable; vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on
Conference_Location
Noida
Print_ISBN
978-1-4799-5990-7
Type
conf
DOI
10.1109/SPIN.2015.7095340
Filename
7095340
Link To Document