Malicious Nodes Detection in MANET Using Back-Off Clustering Approach

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET

Mobile Ad hoc Network (MANET) is a significant concept of wireless networks which comprises of thousands of nodes that are mobile as well as autonomous and they do not requires any existing network infrastructure. The autonomous nodes can freely and randomly move within the network which can create temporary dynamic network and these networks can change their topology frequently. The security i...

متن کامل

Performance Evaluation for Detection of Malicious Nodes Using Svm in Manet

DOI: 10.5281/zenodo.59957 ABSTRACT Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table ...

متن کامل

Stable Clustering in MANET Using Nodes Link Time

A mobile ad hoc network (MANET) is a self configuring network of mobile devices connected by wireless links. In order to achieve stable clusters, the cluster-heads maintaining the cluster should be stable with minimum overhead of cluster re-elections. This work proposes selecting stable cluster heads using a modified Weighted Clustering Algorithm and combining it with Link Expiration Time calcu...

متن کامل

A Clustering Approach for MANET Nodes Using Multiple Network Management Criteria

The authors propose an approach for clustering Mobile Ad Hoc Network (MANET) nodes utilizing a variety of criteria. The clustering approach builds upon the notion of hierarchical or clustered management for MANETs and identifies logical clusters of nodes. A binary relationship matrix between all network nodes is created for each criterion that displays the advantage of having two given nodes in...

متن کامل

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Circuits and Systems

سال: 2016

ISSN: 2153-1285,2153-1293

DOI: 10.4236/cs.2016.78180