Abstract

Wireless ad hoc networks are used in emergency situations especially for surveillance and monitoring. The nodes in the ad hoc networks are self-organized and can accommodate by themselves with the available resources. The nodes are capable of random movement and hence there is no fixed infrastructure. The purpose of the ad hoc networks can be fulfilled only if all nodes cooperate in routing for successful delivery of packets. But in practice, some nodes may become malicious so as to preserve their own resources. If the number of such malicious nodes increases, the performance of the network degrades significantly. In this study we introduce a novel unique node based clustering and location key pair based security for the detection of malicious nodes in the network. The simulation results show that the proposed approach is more efficient in the detection of malicious nodes.

Highlights

  • Wireless ad hoc network is a collection of mobile nodes that can communicate with each other via wireless links

  • Novel Unique Node Based Clustering (NUNBC) technique provides more reliable and better performance in detecting the malicious nodes so that they can be avoided while making routing decisions

  • It is concluded that the proposed approach results in better performance of the network in terms of detection rate, energy and throughput

Read more

Summary

Introduction

Wireless ad hoc network is a collection of mobile nodes that can communicate with each other via wireless links. The nodes individually or collectively perform routing and data forwarding themselves. The resource consumption of the nodes vary based on the application of the network. The current routing protocols for MANETs are based on the assumption that all the nodes cooperate in routing and data forwarding. This is not the case in practice. Due to the availability of low resources like computing power, battery life and energy, some nodes may behave maliciously in the sense that they will agree on routing but don’t perform data forwarding for other nodes as it will consume their valuable resources. The malicious nodes are willing to spend their resources only for themselves i.e., to forward their own packets. Such nodes won’t spend their resources for forwarding others’ packets; they won’t forward the packets meant for other nodes; they drop the packets of other nodes

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.