DocumentCode :
3574443
Title :
Detecting malicious nodes in MANET using rateless codes for maximum content distribution
Author :
Suganthi, N. ; Neelavathy Pari, S.
Author_Institution :
Dept. of Comput. Technol., Madras Inst. of Technol., Chennai, India
fYear :
2014
Firstpage :
308
Lastpage :
311
Abstract :
A mobile ad hoc network is a self-organizing infrastructure less network in which collection of mobile nodes are connected by wireless. Security is a major concern in real time mobile environment to provide secured communication. Major problem in wireless network security is data integrity. Existing cryptographic techniques protects the data which can easily be forged by the adversaries. In this paper the pollution attack that modifies the data packet which is easy to launch bogus data inside the network and significantly reduces the network performance. Rateless codes technique is used to encode and decode the data packets, to maintain the integrity of original data. Rateless codes are class of linear error correcting codes and create unlimited number of symbols. The proposed system determines the pollution attack using belief propagation inference technique in order to prevent fake data packets propagate throughout the network. Belief propagation is an iterative process to pass and update the messages until convergence among neighboring variables that allows acting inference on graphical models such as markov random fields, factor graph etc. It is also used to determine the marginal probabilities of all the variables and these estimated marginal probabilities are called as beliefs. The proposed work has been simulated using ns2.35 to evaluate the performance against honest and malicious mobile nodes.
Keywords :
belief networks; content management; cryptography; data integrity; error correction codes; inference mechanisms; linear codes; mobile ad hoc networks; network coding; statistical distributions; MANET malicious node detection; belief propagation inference technique; bogus data; cryptographic technique; data forging; data integrity; fake data packet propagation prevention; graphical model; linear error correcting code; marginal probability; maximum content distribution; mobile ad hoc network; pollution attack; rateless code; secured communication; self-organizing infrastrncture less network; wireless network security; Encoding; Mobile ad hoc networks; Peer-to-peer computing; Protocols; Throughput; Wireless communication; Belief Propagation; MANET; Pollution attack; Rateless codes;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computing (ICoAC), 2014 Sixth International Conference on
Print_ISBN :
978-1-4799-8466-4
Type :
conf
DOI :
10.1109/ICoAC.2014.7229731
Filename :
7229731
Link To Document :
بازگشت