Abstract

Security in mobile ad-hoc networks is the key issue because the individual nodes in the network are operated without any centralized authority. External and internal attacks are possible on the network. Different types of potential threats to network are persistently developing and in order to battle them back, we need to atleast know them theoretically so that with the rise of wireless networks, the security arrangements turn out to be flawlessly coordinated and more adaptable. Within a short span of time, networks have grown in both size and significance. There could be serious consequences like theft of information, loss of privacy and can even result in the bankruptcy of an institution if the network security is compromised. The utilization of a compelling security approach is the most essential stride that an institution can take to ensure its network security. In order to protect its network, an institution must adopt the application of an effective security policy. In this paper, we have detected malicious and selfish nodes existing in the network with the help of a trusted contact based watchdog and identified the black hole and gray hole attacks using a trust based reputation mechanism.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call